Search

Categories

    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss

Filter By Price

$
-
$

Dietary Needs

Top Rated Product

product-img product-img

Modern Chair

$165.00
product-img product-img

Plastic Chair

$165.00
product-img product-img

Design Rooms

$165.00

Brands

  • Wooden
  • Chair
  • Modern
  • Fabric
  • Shoulder
  • Winter
  • Accessories
  • Dress

Welcome and thank you for visiting us. For any query call us on 0799 626 359 or Email [email protected]

Offcanvas Menu Open

Shopping Cart

Africa largest book store

Sub Total:

Search for any Title

Big Data Analytics with Applications in Insider Threat Detection

By: (Author) Bhavani Thuraisingham , (Author) Latifur Khan , (Author) Mohammad Mehedy Masud , (Author) Pallabi Parveen

Manufacture on Demand

Ksh 9,050.00

Format: Paperback or Softback

ISBN-10: 0367657422

ISBN-13: 9780367657420

Publisher: Taylor & Francis Ltd

Imprint: CRC Press

Country of Manufacture: GB

Country of Publication: GB

Publication Date: Sep 30th, 2020

Print length: 544 Pages

Weight: 1,086 grams

Dimensions (height x width x thickness): 17.80 x 25.30 x 2.80 cms

Product Classification: Databases
Computer security

Choose your Location

Shipping & Delivery

Door Delivery

Delivery fee

Delivery in 10 to 14 days

  • Description

  • Reviews

Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud framework, and the applications for insider threat detection.
Today''s malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Get Big Data Analytics with Applications in Insider Threat Detection by at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by Taylor & Francis Ltd and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment

Customer Reviews

Based on 0 reviews

Mind, Body, & Spirit