BOOKS - PROGRAMMING - Improving Information Security Practices Through Computational ...
Improving Information Security Practices Through Computational Intelligence - Wasan Shaker Awad and El Sayed M. El-Alfy 2015 PDF IGI Global BOOKS PROGRAMMING
ECO~30 kg CO²

2 TON

Views
92087

Telegram
 
Improving Information Security Practices Through Computational Intelligence
Author: Wasan Shaker Awad and El Sayed M. El-Alfy
Year: 2015
Format: PDF
File size: 25 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Computational Intelligence in Software Modeling (De Gruyter Frontiers in Computational Intelligence Book 13)
Entity Information Life Cycle for Big data Master Data Management and Information Integration
Ultimate AWS Certified Cloud Practitioner|s Exam Guide: Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and … AWS CLF-C02 Certification (English Editio
Information and Business Performance: A Study of Information Systems and Services in High-Performing Companies (British Library Research Series)
Sustainability in Software Engineering and Business Information Management: Proceedings of the Conference SSEBIM 2022 (Lecture Notes in Information Systems and Organisation)
Information Security and Cryptology - ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, … Papers (Lecture Notes in Computer Science)
Advances in Computational Vision and Robotics: Proceedings of the International Conference on Computational Vision and Robotics (Learning and Analytics in Intelligent Systems, 33)
Thermal Energy Systems: Design, Computational Techniques, and Applications (Advances in Manufacturing, Design and Computational Intelligence Techniques)
Computational Methods in Engineering: Finite Difference, Finite Volume, Finite Element, and Dual Mesh Control Domain Methods (Applied and Computational Mechanics)
ISO 646-1973 Information technology — ISO 7-bit coded character set for information interchange
Applications of Computational Intelligence Techniques in Communications (Advances in Manufacturing, Design and Computational Intelligence Techniques)
Information Sources in Information Technology
Information Theory for Beginners: Demystifying Information Theory. A Beginner|s Guide
Information Physics Physics-Information and Quantum Analogies for Complex Systems Modeling
Neural Information Processing: 29th International Conference, ICONIP 2022, Virtual Event, November 22-26, 2022, Proceedings, Part IV (Communications in Computer and Information Science Book 1791)
Key Digital Trends Shaping the Future of Information and Management Science: Proceedings of 5th International Conference on Information Systems and … (Lecture Notes in Networks and Systems, 671)
CISA - Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems
Disaster Management and Information Technology: Professional Response and Recovery Management in the Age of Disasters (Public Administration and Information Technology Book 40)
Health Information Processing: 8th China Conference, CHIP 2022, Hangzhou, China, October 21-23, 2022, Revised Selected Papers (Communications in Computer and Information Science)
Information Systems Foundations: Theory Building in Information Systems
Information Sources in Metallic Materials (Guides to Information Sources)
Advances in Information Retrieval: 45th European Conference on Information Retrieval, ECIR 2023, Dublin, Ireland, April 2-6, 2023, Proceedings, Part I (Lecture Notes in Computer Science Book 13980)
Automatische Klassifikation Und Information Retrieval: Anwendung Und Entwicklung Komplexer Verfahren in Information-Retrieval-Systemen Und Ihre Evaluierung
Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications … (Lecture Notes in Networks and Systems, 6
Singer|s Security: An MM First Time Bodyguard Romance (Alden Security Book 2)
Social Security Disability Insurance (American Political, Economic, and Security Issues)
Thor|s Microsoft Security Bible A Collection of Practical Security Techniques
Agile Application Security Enabling Security in a Continuous Delivery Pipeline
Rethinking (In)Security in the European Union: The Migration-Identity-Security Nexus
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Enhancing IoT Security A holistic approach to security for connected platforms
CompTIA Security+ Guide to Network Security Fundamentals, Seventh Edition
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges
Enhancing IoT Security A holistic approach to security for connected platforms
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Business Financial Information Secrets How a Business Produces and Utilizes Critical Financial Information
Living Weapons: Biological Warfare and International Security (Cornell Studies in Security Affairs)
Japan s Evolving Notion of National Security (Asian Political, Economic and Security Issues)
Enhancing IoT Security: A holistic approach to security for connected platforms (English Edition)
The Supply Side of Security: A Market Theory of Military Alliances (Studies in Asian Security)