Object's details: Wykorzystanie analizy zachowania użytkownika do wykrywania ataków na bezpieczeństwo systemu informatycznego
Provider:Polona
Description
- Title:
- Creator:
- Description:
- Object availability:
- Date:
- Language:
- Source:
- Relation:
- Subject:
- Identifier:
- Data provider:
- Can I use it?:
- Type:
Similar objects
Creator:Madej, Jan (1973- )
Date:2007
Type:other
Creator:Madej, Jan (1973- )
Date:2011
Type:other
Creator:Ceglarek, Dariusz
Date:2015.11.15
Type:text
Creator:Janczak, Józef | Nowak, Andrzej (nauki wojskowe)
Date:2013.12.31 | 2013
Type:text
Creator:Sołtysik-Piorunkiewicz, Anna
Date:2014
Type:text
Creator:Dyczkowski, Mirosław
Date:1983.12.31 | 1983
Type:text
Creator:Karlińska, Maria
Date:2014
Type:text
Creator:Głód, Wojciech
Date:2016
Type:text