Showing 1 - 3 of 3
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727905
Persistent link: https://www.econbiz.de/10009779900
Persistent link: https://www.econbiz.de/10011912745