BOOKS - PROGRAMMING - Improving Information Security Practices Through Computational ...
Improving Information Security Practices Through Computational Intelligence - Wasan Shaker Awad and El Sayed M. El-Alfy 2015 PDF IGI Global BOOKS PROGRAMMING
ECO~30 kg CO²

2 TON

Views
92083

Telegram
 
Improving Information Security Practices Through Computational Intelligence
Author: Wasan Shaker Awad and El Sayed M. El-Alfy
Year: 2015
Format: PDF
File size: 25 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Improving Information Security Practices Through Computational Intelligence
Information Security Principles and Practices, 2nd Edition
Handbook of Research on Intelligent Data Processing and Information Security Systems (Advances in Information Security, Privacy, and Ethics)
Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard
The New Information Literacy Instruction: Best Practices (Best Practices in Library Services)
Recent Advances in Computational Intelligence and Cyber Security: The International Conference on Computational Intelligence and Cyber Security
Lightweight Hardware Security and Physically Unclonable Functions Improving Security of Constrained IoT Devices
Information Security A Practical Guide: Information Security A Practical Guide - Bridging the gap between IT and management
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Security Analytics A Data Centric Approach to Information Security
Large-Scale Data Streaming, Processing, and Blockchain Security (Advances in Information Security, Privacy, and Ethics)
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Advances in Information Security, Privacy, and Ethics)
The Information Systems Security Officer|s Guide Establishing and Managing a Cyber Security Program, 3rd Edition
Improving Cancer Diagnosis and Care: Clinical Application of Computational Methods in Precision Oncology: Proceedings of a Workshop
Computational Intelligence in Information
Computational Intelligence for Information Retrieval
Information and Cyber Security: 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Communications in Computer and Information Science, 1166)
Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings (Communications … Computer and Information Science Book
Policy as Code Improving Cloud Native Security
Policy as Code Improving Cloud Native Security
Improving Security, Privacy, and Trust in Cloud Computing
Policy as Code: Improving Cloud Native Security
Improving Security, Privacy, and Trust in Cloud Computing
Intelligence and Information Policy for National Security: Key Terms and Concepts (Security and Professional Intelligence Education Series)
Cyber Security The Beginners Guide to Learning the Basics of Information Security and Modern Cyber Threats
Learning from a Disaster: Improving Nuclear Safety and Security after Fukushima
Machine Learning for Computer and Cyber Security Principle, Algorithms, and Practices (Cyber Ecosystem and Security)
Microsoft Azure Security Technologies (AZ-500) - A Certification Guide: Get qualified to secure Azure AD, Network, Compute, Storage and Data services through … security best practices (English E
Cryptography for Security and Privacy in Cloud Computing (Information Security and Privacy)
Recent Advances in Computational Intelligence and Cyber Security
Recent Advances in Computational Intelligence and Cyber Security
Economics of Information Security
The Information Security Dictionary
Principles of Information Security
Information Security Handbook
Information Security and Optimization
Library Policy for Preservation and Conservation in the European Community: Principles, Practices and the Contribution of New Information Technologies
Information Security and Computer book
Honeypots A New Paradigm to Information Security
Information Security Management, Second Edition