Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (5)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Condition Learn more

  • New (5)
  • As New, Fine or Near Fine (No further results match this refinement)
  • Very Good or Good (No further results match this refinement)
  • Fair or Poor (No further results match this refinement)
  • As Described (No further results match this refinement)

Binding

Collectible Attributes

Language (1)

Price

  • Any Price 
  • Under £ 20 (No further results match this refinement)
  • £ 20 to £ 35 
  • Over £ 35 (No further results match this refinement)
Custom price range (£)

Free Shipping

  • Free Shipping to U.S.A. (No further results match this refinement)

Seller Location

  • Jay Kant Pratap Singh Yadav

    Language: English

    Published by LAP LAMBERT Academic Publishing, 2017

    ISBN 10: 3330079010 ISBN 13: 9783330079014

    Seller: preigu, Osnabrück, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    £ 29.54

    £ 60.46 shipping
    Ships from Germany to U.S.A.

    Quantity: 5 available

    Add to basket

    Taschenbuch. Condition: Neu. Implementation of Database intrusion Detection | Jay Kant Pratap Singh Yadav | Taschenbuch | 64 S. | Englisch | 2017 | LAP LAMBERT Academic Publishing | EAN 9783330079014 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.

  • Jay Kant Pratap Singh Yadav

    Language: English

    Published by LAP LAMBERT Academic Publishing Apr 2017, 2017

    ISBN 10: 3330079010 ISBN 13: 9783330079014

    Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 31.94

    £ 19.87 shipping
    Ships from Germany to U.S.A.

    Quantity: 2 available

    Add to basket

    Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results 64 pp. Englisch.

  • Jay Kant Pratap Singh Yadav

    Language: English

    Published by LAP LAMBERT Academic Publishing, 2017

    ISBN 10: 3330079010 ISBN 13: 9783330079014

    Seller: moluna, Greven, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 27.82

    £ 42.32 shipping
    Ships from Germany to U.S.A.

    Quantity: Over 20 available

    Add to basket

    Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Yadav Jay Kant Pratap SinghJay Kant Pratap Singh Yadav Completed his B.Tech(Computer Science & Engineering), M.Tech (Computer Engineering) from Sardar Vallabhbhai National Institute of Technology,Surat(India). He has about 13 years t.

  • Jay Kant Pratap Singh Yadav

    Language: English

    Published by LAP LAMBERT Academic Publishing Apr 2017, 2017

    ISBN 10: 3330079010 ISBN 13: 9783330079014

    Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 31.94

    £ 51.83 shipping
    Ships from Germany to U.S.A.

    Quantity: 1 available

    Add to basket

    Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the resultsVDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 64 pp. Englisch.

  • Jay Kant Pratap Singh Yadav

    Language: English

    Published by LAP LAMBERT Academic Publishing, 2017

    ISBN 10: 3330079010 ISBN 13: 9783330079014

    Seller: AHA-BUCH GmbH, Einbeck, Germany

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 31.94

    £ 52.32 shipping
    Ships from Germany to U.S.A.

    Quantity: 1 available

    Add to basket

    Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Here, we propose data mining approach for database intrusion detection. In each database, there are a few attributes or columns that are more important or sensitive to be tracked or sensed for malicious modifications as compared to the other attributes. Our approach concentrates on mining pre-write as well as post-write data dependencies among the important or sensitive data items in relational database. By data dependency we refer to the data access correlations between two or more data items. These dependencies are generated in the form of association rules i.e. before one data item is updated in the data base what other data items probably need to be read or write and after this data item is updated what other data items are most likely to be updated by the same transaction. Any transaction that does not follow these dependency rules are identified as malicious. We also suggest removal of redundant rules in our proposed algorithm to minimize the number of comparisons during detection phase. We compare our proposed approach with existing approach on various performance evaluation metrics and analyze the results.