-
181
Safety in the digital age : sociotechnical perspectives on algorithms and machine learning /
Subjects: “…Computer security.…”
Get full text
Online Book -
182
The NICE cyber security framework : cyber security intelligence and analytics /
Subjects: “…Computer security.…”
Get full text
Online Book -
183
Guide to cybersecurity in digital transformation : trends, methods, technologies, applications and best practices /
Subjects: “…Computer security.…”
Get full text
Online Book -
184
Managing risks in digital transformation : navigate the modern landscape of digital threats with the help of real-world examples and use cases /
Subjects: “…Computer security.…”
Get full text
Online Book -
185
Cybersecurity myths and misconceptions : avoiding the hazards and pitfalls that derail us /
Subjects: “…Computer security.…”
Get full text
Online Book -
186
Operationalizing threat intelligence /
Subjects: “…Computer security.…”
Get full text
Online Audio (Non-Music) -
187
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies /
Subjects: “…Computer security.…”
Get full text
Online Book -
188
-
189
-
190
-
191
Confidential computing : hardware based memory protection /
Subjects: “…Computer security.…”
Get full text
Online Book -
192
Cybersecurity : attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system /
Subjects: “…Computer security.…”
Get full text
Online Book -
193
-
194
Becoming a cyber security professional : a beginner's career guide.
Subjects: “…Computer security.…”
Get full text
Online Video Online Video -
195
-
196
-
197
-
198
Cybersecurity : a technology landscape analysis /
Subjects: “…Computer security.…”
Get full text
Online Book -
199
Demystifying intelligent multimode security systems: an edge-to-cloud cybersecurity solutions guide /
Subjects: “…Computer security.…”
Get full text
Online Book -
200
Security orchestration, automation and response for security analysts : learn the secrets of SOAR to improve MTTA and MTTR and strengthen your security posture /
Subjects: “…Computer security.…”
Get full text
Online Book