Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
In the different chapters of this book, we explored the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media.
Bemærk: Kan leveres før jul.
The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security.
Bemærk: Kan ikke leveres før jul.
This book shares new methodologies, technologies, and practices for resolving issues associated with leveraging AI-centric modeling, data analytics, ML-aided models, IoT-driven applications, and cybersecurity techniques in the era of the Industrial Revolution 4.0.
Bemærk: Kan ikke leveres før jul.
5G-Based Smart Hospitals and Healthcare Systems provides an overview of the role of advanced technologies in... Læs mere
Bemærk: Kan ikke leveres før jul.
Governments around the world use machine learning in automated decision-making systems for a broad range of functions. This book seeks to answer the question: what standards should be applied to machine learning to mitigate disparate impact in automated decision-making?
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.
The main purpose of this book is to analyze and evaluate what has been carried out regarding NATO’s operational arrangements and its Cyber Defense approach, and, secondly, to explain this in the lens of Game Theory.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Bemærk: Kan leveres før jul.
Systematic Security: A CISO’s Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies.