BOOKS - PROGRAMMING - Improving Information Security Practices Through Computational ...
Improving Information Security Practices Through Computational Intelligence - Wasan Shaker Awad and El Sayed M. El-Alfy 2015 PDF IGI Global BOOKS PROGRAMMING
ECO~30 kg CO²

2 TON

Views
92084

Telegram
 
Improving Information Security Practices Through Computational Intelligence
Author: Wasan Shaker Awad and El Sayed M. El-Alfy
Year: 2015
Format: PDF
File size: 25 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Information Privacy Engineering and Privacy by Design Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling (Artech House Intelligence and Information Operations)
Algorithms: Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences, 17)
Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, … Business Information Processing Boo
Information Security Incident and Data Breach Management A Step-by-Step Approach
Information Security Incident and Data Breach Management A Step-by-Step Approach
Enterprise Information Security Architecture: The Ultimate Step-By-Step Guide
Microsoft Azure Security Center Second Edition (IT Best Practices - Microsoft Press)
Logic and Algorithms in Computational Linguistics 2021 (LACompLing2021) (Studies in Computational Intelligence Book 1081)
Simulation and Computational Red Teaming for Problem Solving (IEEE Press Series on Computational Intelligence)
A New Approach to the Nuclear Fuel Cycle: Best Practices for Security, Nonproliferation, and Sustainable Nuclear Energy (CSIS Reports)
Fault Analysis in Cryptography (Information Security and Cryptography)
A Survey of Computational Physics: Introductory Computational Science
Computational Intelligence and Blockchain in Complex Systems: System Security and Interdisciplinary Applications (Advanced Studies in Complex Systems)
Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings (Communications in Computer and Information Science)
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications (Contributions to Environmental Sciences and Innovative Business Technology)
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers (Lecture Notes in Computer Science Book 13837)
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, … and Communication Technology, 658)
Papers in Computational Linguistics: Proceedings of the 3rd International Meeting on Computational Linguistics held at Debrecen, Hungary (Janua Linguarum. Series Maior, 91)
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
Computational Intelligence and Mathematics for Tackling Complex Problems 4 (Studies in Computational Intelligence, 1040)
Edge Computational Intelligence for AI-Enabled IoT Systems (Advances in Computational Collective Intelligence)
Machine Learning and Deep Learning in Computational Toxicology (Computational Methods in Engineering and the Sciences)
What Is Computer Science?: An Information Security Perspective (Undergraduate Topics in Computer Science)
No Bull Information: A Humorous Practical Guide to Help Americans Adapt to the Information Age
Searching for Health Information: The Cancer Information Service Model (Anniversary Collection)
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Managing Meaning in Ukraine: Information, Communication, and Narration since the Euromaidan Revolution (Information Policy Series)
Human Information Retrieval (History and Foundations of Information Science)
Information Architecture and UX Design The Integration of Information Spaces, Third Edition
Advances in Info-Metrics Information and Information Processing across Disciplines
Ultimate AWS Certified Cloud Practitioner|s Exam Guide Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification
Ultimate AWS Certified Cloud Practitioner|s Exam Guide Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification