BOOKS - NETWORK TECHNOLOGIES - Information Security and Optimization
Information Security and Optimization - Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta 2021 PDF CRC Press BOOKS NETWORK TECHNOLOGIES
ECO~14 kg CO²

1 TON

Views
74063

Telegram
 
Information Security and Optimization
Author: Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
Year: 2021
Pages: 224
Format: PDF
File size: 23 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Information Security and Optimization
Algorithms: Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences, 17)
Handbook of Research on Intelligent Data Processing and Information Security Systems (Advances in Information Security, Privacy, and Ethics)
Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard
Information Security A Practical Guide: Information Security A Practical Guide - Bridging the gap between IT and management
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Security Analytics A Data Centric Approach to Information Security
Large-Scale Data Streaming, Processing, and Blockchain Security (Advances in Information Security, Privacy, and Ethics)
The Information Systems Security Officer|s Guide Establishing and Managing a Cyber Security Program, 3rd Edition
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Advances in Information Security, Privacy, and Ethics)
Information and Cyber Security: 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Communications in Computer and Information Science, 1166)
Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings (Communications … Computer and Information Science Book
Intelligence and Information Policy for National Security: Key Terms and Concepts (Security and Professional Intelligence Education Series)
Cyber Security The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Cryptography for Security and Privacy in Cloud Computing (Information Security and Privacy)
Algorithms Big Data, Optimization Techniques, Cyber Security
Algorithms Big Data, Optimization Techniques, Cyber Security
RFID Protocol Design, Optimization, and Security for the Internet of Things
The Information Security Dictionary
Economics of Information Security
Information Security Handbook
Principles of Information Security
Honeypots A New Paradigm to Information Security
Information Security and Computer book
Computer and Information Security Handbook
Elementary Information Security Third Edition
Information Security Management, Second Edition
Getting an Information Security Job For Dummies
Fundamentals Of Information Systems Security
Managing Information Systems Security
Management of Information Security, Sixth Edition
Creating an Information Security Program from Scratch
Mastering Information Security Compliance Managemen
Computer and Information Security Handbook, Third Edition
Foundations of Information Security A Straightforward Introduction
Zero To Mastery In Information Security And Cyber Laws
Principles of Information Security, 6th Edition
Information Security Foundations, Technologies and Applications
Intelligent Systems for Stability Assessment and Control of Smart Power Grids Security Analysis, Optimization
Privacy in the Age of Innovation AI Solutions for Information Security