Listing 1 - 10 of 35 | << page >> |
Sort by
|
Choose an application
Psycholinguistics --- Sociolinguistics --- Pragmatics --- Applied linguistics. --- Discourse analysis. --- Speech acts (Linguistics) --- Linguistique appliquée --- Analyse du discours --- Actes de parole --- Applied linguistics --- Discourse analysis --- Communicatie (taalwetenschap) --- Discoursanalyse --- Sociolinguïstiek --- Toegepaste linguïstiek --- Speech acts (Linguistics). --- Communicatie (taalwetenschap). --- Discoursanalyse. --- Sociolinguïstiek. --- Toegepaste linguïstiek. --- Linguistique appliquée --- Linguistics --- Illocutionary acts (Linguistics) --- Speech act theory (Linguistics) --- Speech events (Linguistics) --- Language and languages --- Speech --- Discourse grammar --- Text grammar --- Semantics --- Semiotics --- Philosophy
Choose an application
Choose an application
Choose an application
Language and languages --- -Foreign languages --- Languages --- Anthropology --- Communication --- Ethnology --- Information theory --- Meaning (Psychology) --- Philology --- Linguistics --- Study and teaching --- Contrastive linguistics --- Comparative linguistics --- Foreign language study --- Language and education --- Language schools --- Contrastive linguistics. --- Study and teaching. --- Language and languages Study and teaching --- Language and languages - Study and teaching
Choose an application
Choose an application
Choose an application
Interaction analysis in education --- Language and languages --- Study and teaching
Choose an application
Choose an application
To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.
Computer networks --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Computer networks -- Security measures. --- Computer Science -- IT. --- Computer security. --- Intrusion detection systems (Computer security). --- Engineering & Applied Sciences --- Computer Science --- Electrical & Computer Engineering --- Telecommunications --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- Computer network architectures. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
American literature --- Ethnicity --- United States --- Literatures --- History and criticism.
Listing 1 - 10 of 35 | << page >> |
Sort by
|