UTN

Vis mig kun

Machine Learning for Cybersecurity Cookbook

Machine Learning for Cybersecurity Cookbook

Emmanuel Tsukerman, Tsukerman

260,50 DKK

SECURITY AND PRIVACY IN AN IT WORLD

SECURITY AND PRIVACY IN AN IT WORLD

MacKinder, Craig

79,32 DKK

Artificial Intelligence for Cybersecurity

Artificial Intelligence for Cybersecurity

Troia, Fabio Di

1167,65 DKK

Chaotic Secure Communication

Chaotic Secure Communication

Sun, Kehui

948,41 DKK

Cybersecurity in Digital Transformation

Cybersecurity in Digital Transformation

Moller, Dietmar P.F.

436,85 DKK

Machine Learning for Cybersecurity

Machine Learning for Cybersecurity

Omar, Marwan

403,64 DKK

Machine Learning for Cybersecurity

Machine Learning for Cybersecurity

Omar, Marwan

403,64 DKK

Computational Intelligence in Pattern Recognition

Computational Intelligence in Pattern Recognition

Pelusi, Danilo

2190,77 DKK

Computational Intelligence in Pattern Recognition

Computational Intelligence in Pattern Recognition

Pelusi, Danilo

2190,77 DKK

Security In Ad-hoc And Sensor Networks

Security In Ad-hoc And Sensor Networks

Janise Mcnair, Mcnair

473,39 DKK

Security In Distributed And Networking Systems

Security In Distributed And Networking Systems

Yi Pan, Pan

436,85 DKK

Information Systems Security in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Turbulent Times

Information Systems Security in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Turbulent Times

Kennedy Njenga

802,25 DKK

Handbook Of Security And Networks

Handbook Of Security And Networks

Frank Haizhon Li, Li

656,09 DKK

Computational Intelligence in Pattern Recognition

Computational Intelligence in Pattern Recognition

Pelusi, Danilo

2190,77 DKK

Computational Intelligence in Pattern Recognition

Computational Intelligence in Pattern Recognition

Pelusi, Danilo

2190,77 DKK

Security Orchestration, Automation, and Response for Security Analysts

Security Orchestration, Automation, and Response for Security Analysts

Kovacevic, Benjamin

295,53 DKK

Zero Trust Architecture

Zero Trust Architecture

Frazier, Jason

436,85 DKK

Zero Trust Architecture

Zero Trust Architecture

Frazier, Jason

436,85 DKK

Security Orchestration, Automation, and Response for Security Analysts

Security Orchestration, Automation, and Response for Security Analysts

Kovacevic, Benjamin

295,53 DKK

Computer Security Fundamentals

Computer Security Fundamentals

II, William Chuck Easttom

473,39 DKK

Practical Guide to Digital Forensics Investigations, A

Practical Guide to Digital Forensics Investigations, A

Hayes, Darren R.

436,85 DKK

Computer Security Fundamentals

Computer Security Fundamentals

II, William Chuck Easttom

473,39 DKK

Computational Intelligence in Pattern Recognition

Computational Intelligence in Pattern Recognition

Pelusi, Danilo

2190,77 DKK

Network Defense and Countermeasures

Network Defense and Countermeasures

II, William Easttom

656,09 DKK

Network Defense and Countermeasures

Network Defense and Countermeasures

II, William Easttom

656,09 DKK

Modern Security Operations Center, The

Modern Security Operations Center, The

Muniz, Joseph

317,82 DKK

Developing Cybersecurity Programs and Policies

Developing Cybersecurity Programs and Policies

Santos, Omar

473,39 DKK

Ransomware and Cyber Extortion

Ransomware and Cyber Extortion

Sprenger, Karen

265,81 DKK

Network Defense and Countermeasures

Network Defense and Countermeasures

II, William Easttom

473,39 DKK

Mainframe Basics for Security Professionals

Mainframe Basics for Security Professionals

Hahn, Tim

158,16 DKK