Katalog
No. Katalog | Katalog | Subjek | Actions |
---|---|---|---|
163891 results (page 1496/16390) | |||
![]()
24.21.429 |
Governing Knowledge in Asia tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
KNOWLEDGE MANAGEMENT
The spread of knowledge is a significant consequence of the process of globalization. Knowledge is used to tackle very diverse issues such as development challenges in emerging markets or the..selengkapnya..
|
|
![]()
24.21.430 |
Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics) tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
CYBER SECURITY
Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of..selengkapnya..
|
|
![]()
24.21.432 |
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
COMPUTER SECURITY
RISK MANAGEMENT,
Cybersecurity Risk Management
In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and..selengkapnya..
|
|
![]()
24.21.433 |
Cybersecurity for Entrepreneurs tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
BUSINESS INTELLIGENCE
ENTREPRENEURSHIP,
One data breach can close a small business before it even gets going. With all that is involved in starting a new business, cybersecurity can easily be overlooked but no..selengkapnya..
|
|
![]()
24.21.434 |
Cybersecurity Blue Team Strategies: Uncover The Secrets of Blue Teams to Combat Cyber Threats in Your Organization tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
CYBERSECURITY
We've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems...selengkapnya..
|
|
![]()
24.21.435 |
Cybersecurity and Privacy Law Handbook: A Beginner’s Guide to Dealing With Privacy and Security While Keeping Hackers at Bay tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
CYBERSECURITY
LAW,
Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand..selengkapnya..
|
|
![]()
24.21.436 |
Cybersecurity In Humanities And Social Sciences: A Research Methods Approach tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
RESEARCH METHODS
CYBER SECURITY,
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still..selengkapnya..
|
|
![]()
24.21.431 |
10 Machine Learning Blueprints You Should Know For Cybersecurity: Protect Your Systems And Boost Your Defenses With Cutting-Edge AI Techniques tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
MACHINE LEARNING
CYBERSECURITY,
Machine learning in security is harder than other domains because of the changing nature and abilities of adversaries, high stakes, and a lack of ground-truth data. This book will prepare..selengkapnya..
|
|
![]()
24.21.437 |
The Cybersecurity Playbook For Modern Enterprises: An End-To-End Guide To Preventing Data Breaches and Cyber Attacks tersedia 1 koleksi total 1 koleksi tersedia 1 file download |
MACHINE LEARNING
CYBERSECURITY,
Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is..selengkapnya..
|
|
![]()
24.33.006 |
Aku dan BPK: Kumpulan Cerpen tersedia 1 koleksi total 1 koleksi |
FICTION
|
|