Books on the topic 'Visualization Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 books for your research on the topic 'Visualization Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Goodall, John R., Gregory Conti, and Kwan-Liu Ma, eds. Visualization for Computer Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8.
Full textMarty, Raffael. Applied security visualization. Upper Saddle River, NJ: Addison-Wesley, 2009.
Find full textInternational Workshop on Visualization for Cyber Security. 6th International Workshop on Visualization for Cyber Security 2009: Atlantic City, New Jersey, USA, October 11, 2009 : proceedings. Piscataway, NJ: IEEE, 2009.
Find full textDavid, Hutchison. Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (11th : 2004 : Washington, D.C.), eds. VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004. New York: ACM, 2004.
Find full textBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. Bellingham, Wash: SPIE, 2010.
Find full textKim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2008.
Find full textDatadriven Security Analysis Visualization And Dashboards. John Wiley & Sons Inc, 2014.
Find full textAxelsson, Stefan, and David Sands. Understanding Intrusion Detection through Visualization. Springer, 2010.
Find full textConti, Greg. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press, 2007.
Find full textAbraham, Ajith. Computational Social Networks: Mining and Visualization. Springer, 2014.
Find full textVizsec 2007 Proceedings Of The Workshop On Visualization For Computer Security. Springer, 2008.
Find full textUnderstanding Intrusion Detection through Visualization (Advances in Information Security). Springer, 2005.
Find full textConti, Gregory, Kwan-Liu Ma, and John R. Goodall. VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security. Springer, 2010.
Find full textIEEE workshop on visualization for computer security 2005 (VizSEC 05): Proceedings. New York City, NY: IEEE, 2005.
Find full textAssociation for Computing Machinery. Vizsec/Dmsec '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, Octo. Association for Computing Machinery (ACM), 2004.
Find full text