nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
1. Leveraging Business Intelligence to Enhance Cyber Security Innovation
Sarika Faisal, Syed Far Abid Hossain,
Saba Fahmida and Rayisa Rayhana
2. Cyber Risk and the Cost of Unpreparedness of Financial Institutions
Naveenan R.V and Suresh G
3. Cyber Security in Banking Sector
Mohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa
4. Is Application of Blockchain Technology in the Field of Accounting Feasible? A Developing Nation Perspective
Emon Kalyan Chowdhury
5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity Salary
Mahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter
6. Test Plan for Immersive Technology-Based Medical Support System
Mohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert
7. Current Challenges of Hand-Based Biometric Systems
Katerina Prihodova, and Miloslav Hub
8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion Detection
Sad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan
9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model Interpretability
Mahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin
10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020
Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag
11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early Stages
Mahmudul Hasan, Sad Wadi Sajid and Md. Al Amin
12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication
Nahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam
13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly Detection
Md. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan