|
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
Subjects:
“...Computer networks / Access control / http://id.loc.gov/authorities/subjects/sh2007008424...”
|
by Thuraisingham, Bhavani M., Abrol, Satyen, Heatherly, Raymond, Kantarcioglu, Murat
Published 2016
Table of Contents:
“...Introduction ; Overview; Analyzing Social Networks; Securing Social Networks; Outline of the Book...”Published 2016
Auerbach