Sökt på: computer security
Vi gjorde istället en sökning på titeln computer security vilket gav totalt 13 träffar
Discovering Hidden Gems in Foreign Languages
This book offers a practical approach to conducting research in foreign languages on topics with a global nexus. It introduces the problem researchers face when getting started …
Violence in Nigeria
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a …
The Global Cyber-Vulnerability Report
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. …
Violence in Nigeria
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a …
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management …
Indian Mujahideen
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of …
The Global Cyber-Vulnerability Report
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. …
A Machine Learning Based Model of Boko Haram
This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by …
Detecting Trust and Deception in Group Interaction
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other …
Anomaly Detection Principles and Algorithms
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of …
Indian Mujahideen
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy “This book presents a highly innovative computational approach to analyzing the strategic behavior of …
Anomaly Detection Principles and Algorithms
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of …