BOOKS - Cyber Security for Next-Generation Computing Technologies
Cyber Security for Next-Generation Computing Technologies - Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda 2024 PDF CRC Press BOOKS
ECO~15 kg CO²

1 TON

Views
51562

Telegram
 
Cyber Security for Next-Generation Computing Technologies
Author: Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda
Year: 2024
Pages: 328
Format: PDF
File size: 11.5 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Machine Learning, Blockchain, and Cyber Security in Smart Environments
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Algorithms Big Data, Optimization Techniques, Cyber Security
What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition
From 5G to 6G Technologies, Architecture, AI, and Security
From 5g to 6g: Technologies, Architecture, Ai, and Security
Communication Technologies and Security
Intelligent IoT for the Digital World Incorporating 5G Communications and Fog/Edge Computing Technologies
Embracing Machines and Humanity Through Cognitive Computing and IoT (Advanced Technologies and Societal Change)
Big Data Computing: Advances in Technologies, Methodologies, and Applications (Computational Intelligence Techniques)
Auto-Identification and Ubiquitous Computing Applications RFID and Smart Technologies for Information Convergence
Security in Computing, 6th Ed
Cyber Security Standards, Practices and Industrial Applications Systems and Methodologies
Cyber Resilience (River Publishers Series in Security and Digital Forensics)
The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry
Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities
Offensive and Defensive Cyber Security Strategies Fundamentals, Theory and Practices
Nature-Inspired Cyber Security and Resiliency Fundamentals, Techniques and Applications
Cyber-Physical Systems and Industry 4.0 Practical Applications and Security Management
Cybersecurity Today Cyber attacks, network security, and threat prevention
Cyber Defense and Situational Awareness (Advances in Information Security Book 62)
Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security
Artificial Intelligence & Blockchain in Cyber Physical Systems Technologies & Applications
Artificial Intelligence & Blockchain in Cyber Physical Systems Technologies & Applications
Blockchain for Cybersecurity in Cyber-Physical Systems (Advances in Information Security, 102)
Cyber Security for Educational Leaders A Guide to Understanding and Implementing Technology Policies
Building a Cyber Risk Management Program Evolving Security for the Digital Age
Cyber Security and Business Analysis: An essential guide to secure and robust systems
Cyber Security and Business Analysis An essential guide to secure and robust systems
Building a Cyber Risk Management Program Evolving Security for the Digital Age
Cyber Security and Business Analysis An essential guide to secure and robust systems
Confident Cyber Security The Essential Insights and How to Protect from Threats, 2nd Edition
Confident Cyber Security The Essential Insights and How to Protect from Threats, 2nd Edition
Advanced Cyber Security Techniques for Data, Blockchain, IoT, and Network Protection
Advances in Security in Computing and Communications
Security in Computing, 6th Edition
Information Security Foundations, Technologies and Applications
Understand the Cyber Attacker Mindset Build a Strategic Security Programme to Counteract Threats
Smart Grid Resilience: Extreme Weather, Cyber-Physical Security, and System Interdependency
Understand the Cyber Attacker Mindset Build a Strategic Security Programme to Counteract Threats