Electronic Books

Total Books: 541 - 560 /920
Lean Business Systems and Beyond

The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications ...

Weiterlesen
Learning to Live in the Knowledge Society : IFIP 20th World Computer Congress, IFIP TC 3 ED-L2L Conference September 7–10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Legitimacy in International Law

In recent years the question of the legitimacy of international law has been discussed quite intensively. Such questions ...

Weiterlesen
Location- and Context-Awareness

These proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...

Weiterlesen
Machine Intelligence and Big Data Analytics for Cybersecurity Applications

This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...

Weiterlesen
Machine Learning Approaches in Cyber Security Analytics

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...

Weiterlesen
Machine Learning Techniques and Analytics for Cloud Security / Rajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal

covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...

Weiterlesen
Machine Learning and Data Mining for Computer Security

This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...

Weiterlesen
NoIMG
Machine Learning and Knowledge Extraction : 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17–20, 2021, Proceedings

This book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...

Weiterlesen
Machine Learning for Computer Scientists and Data Analysts : From an Applied Perspective / Setareh Rafatirad, Houman Homayoun, Zhiqian Chen, Sai Manoj Pudukotai Dinakarrao

Describes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...

Weiterlesen
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

Weiterlesen
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Weiterlesen
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Weiterlesen
NoIMG
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Weiterlesen
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Weiterlesen
Malware Detection

Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...

Weiterlesen
Manage IT!

Discusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling ...

Weiterlesen
Managing Critical Infrastructure Risks

At the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...

Weiterlesen
Managing Cyber Threats

This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts ...

Weiterlesen
Managing Information Systems Security and Privacy

The book deals with the management of information systems security and privacy, based on a model that covers technological, ...

Weiterlesen
Total Books: 541 - 560 /920