Muut ovat myös lukeneet

Ohita lista
  1. Artificial Intelligence for Cybersecurity : Develop AI approaches to solve cybersecurity problems in your organization

    Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras

    book
  2. Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques

    Milad Aslaner

    book
  3. Combating Cyberattacks Targeting the AI Ecosystem : Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities

    Aditya K. Sood

    book
  4. Mastering Cyber Intelligence

    Jean Nestor M. Dahj

    book
  5. Incident Response with Threat Intelligence

    Roberto Martinez

    book
  6. IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications

    book
  7. Market Intelligence

    Fouad Sabry

    book
  8. In Depth Security Vol. II

    book
  9. Living to Tell the Horrid Tales: True Life Stories of Fomer Slaves, Historical Documents & Novels

    Frederick Douglass, Harriet Jacobs, Harriet Beecher Stowe, Mark Twain, Lydia Maria Child, Harriet E. Wilson, William Wells Brown, Charles W. Chesnutt, James Weldon Johnson, Albion Winegar Tourgée, Sutton E. Griggs, Solomon Northup, Willie Lynch, Nat Turner, Sojourner Truth, Mary Prince, William Craft, Ellen Craft, Louis Hughes, Jacob D. Green, Booker T. Washington, Olaudah Equiano, Elizabeth Keckley, William Still, Sarah H. Bradford, Josiah Henson, Charles Ball, Austin Steward, Henry Bibb, L. S. Thompson, Kate Drumgoold, Lucy A. Delaney, Moses Grandy, John Gabriel Stedman, Henry Box Brown, Margaretta Matilda Odell, Thomas S. Gaines, Brantz Mayer, Aphra Behn, Theodore Canot, Daniel Drayton, Thomas Clarkson, F. G. De Fontaine, John Dixon Long, Stephen Smith, Joseph Mountain, Ida B. Wells-Barnett

    book
  10. In Depth Security Vol. III

    book
  11. Managing Cybersecurity Risk : How Directors and Corporate Officers Can Protect their Businesses

    book
  12. Spies for Hire : The Secret World of Intelligence Outsourcing

    Tim Shorrock

    book