Skip to content
VuFind
  • Your Account
  • Log Out
  • Login
  • Language
    • English
    • Malay
    • 中文(简体)
    • Tamil
Advanced
  • Search
  • Evaluating intrusion detection...
  • Holdings
  • Cite this
  • Text this
  • Email this
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Save to List
Cover Image
QR Code

Evaluating intrusion detection systems in a Unix-based environment / by Mazni Zambri.

Saved in:
Bibliographic Details
Main Author: Mazni, Zambri
Format: Thesis
Published: 2003
Subjects:
QA Mathematics
Online Access:http://pendeta.um.edu.my/client/en_AU/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:694666/ada?qu=Mazni+Zambri
http://pendeta.um.edu.my/client/en_AU/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:694666/ada?qu=Mazni+Zambri
http://studentsrepo.um.edu.my/2952/1/PENDAHULUAN.pdf
http://studentsrepo.um.edu.my/2952/2/KANDUNGAN.pdf
http://studentsrepo.um.edu.my/2952/3/ABSTRAK.pdf
http://studentsrepo.um.edu.my/2952/4/BAB_1.pdf
http://studentsrepo.um.edu.my/2952/5/BAB_2.pdf
http://studentsrepo.um.edu.my/2952/6/BAB_3.pdf
http://studentsrepo.um.edu.my/2952/7/BAB_4.pdf
http://studentsrepo.um.edu.my/2952/8/BAB_5.pdf
http://studentsrepo.um.edu.my/2952/9/BAB_6.pdf
http://studentsrepo.um.edu.my/2952/10/BAB_7.pdf
http://studentsrepo.um.edu.my/2952/11/BAB_8.pdf
http://studentsrepo.um.edu.my/2952/12/LAMPIRAN.pdf
http://studentsrepo.um.edu.my/2952/13/BIBLIOGRAFI.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
  • Holdings
  • Description
  • Comments
  • Preview
  • Collection Items

Internet

http://pendeta.um.edu.my/client/en_AU/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:694666/ada?qu=Mazni+Zambri
http://pendeta.um.edu.my/client/en_AU/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:694666/ada?qu=Mazni+Zambri
http://studentsrepo.um.edu.my/2952/1/PENDAHULUAN.pdf
http://studentsrepo.um.edu.my/2952/2/KANDUNGAN.pdf
http://studentsrepo.um.edu.my/2952/3/ABSTRAK.pdf
http://studentsrepo.um.edu.my/2952/4/BAB_1.pdf
http://studentsrepo.um.edu.my/2952/5/BAB_2.pdf
http://studentsrepo.um.edu.my/2952/6/BAB_3.pdf
http://studentsrepo.um.edu.my/2952/7/BAB_4.pdf
http://studentsrepo.um.edu.my/2952/8/BAB_5.pdf
http://studentsrepo.um.edu.my/2952/9/BAB_6.pdf
http://studentsrepo.um.edu.my/2952/10/BAB_7.pdf
http://studentsrepo.um.edu.my/2952/11/BAB_8.pdf
http://studentsrepo.um.edu.my/2952/12/LAMPIRAN.pdf
http://studentsrepo.um.edu.my/2952/13/BIBLIOGRAFI.pdf

Similar Items

  • A brief introduction to intrusion detection system
    by: A. B., Mohamed, et al.
    Published: (2012)
  • The effectiveness of detection methods in intrusion detection systems / by Hafiz bin Mohd Sarim.
    by: Mohd Sarim, Hafiz
    Published: (2002)
  • Anomaly intrusion detection based on fuzzy logic and data mining
    by: Idris, Norbik Bashah, et al.
    Published: (2006)
  • Intrusive system calls analysis for intrusion detection system
    by: Ramakrishna, Pathmenanthan
    Published: (2004)
  • Anomaly intrusion detection model using data mining techniques
    by: Abdullah, Abdul Hanan, et al.
    Published: (2006)

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • NeuGuide
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs
Loading...