-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Risks and Security of Internet and Systems
Springer 出版This book constitutes the revised selected papers of the 19th International Conference on Risks and
-
-
-
-
Adversary Emulation with Mitre Att&ck
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity as
-
-
Hands-On Artificial Intelligence for IoT - Second Edition
Packt 出版Master AI and IoT integration, from fundamentals to advanced techniques, and revolutionize your app
-
-
-
Practical Network Security with OpenSSL
Gain practical OpenSSL skills for real-world cybersecurity challenges Book DescriptionOpenSSL is th
-
-
Understanding the Artificial Intelligence Revolution
CRC Press 出版Suitable for the general reader, Understanding the Artificial Intelligence Revolution: Between Cat
-
Cybersecurity in Knowledge Management
Ingram 出版Cybersecurity in Knowledge Management: Cyberthreats and SolutionsIn an era where digital transforma
-
Stop Wasting Research
Ingram 出版Why do crucial customer insights often fail to drive product decisions? The answer: wasted research
-
-
-
-
-
-
-
-
-
-
-
Interpretability and Explainability in AI Using Python
Demystify AI Decisions and Master Interpretability and Explainability Today Book DescriptionInterpr
-
-
-
-
Optimal Spending on Cybersecurity Measures
Ingram 出版Optimal Spending on Cybersecurity Measures: AI and Governance introduces the cyber risk investment
-
-
-
-
-
Biometric Technology and Authentication
Ingram 出版Biometric Technology & Authentication is an update to the first edition of this book. Some of the u