Skip to content

ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ

  • Home
  • HOME
Home Cybersecurity Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives

Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives

Cybersecurity admin — 27.11.2023 Comments off
Auerbach.Computer.and_.Cyber_.Security.Principles.Algorithm.Applications.and_.Perspectives.Nov_.2018ดาวน์โหลด

Related Posts

Identity Theft Handbook Detection, Prevention, and Security

[ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

วิธีปฏิบัติงานด้านความมั่นคงปลอดภัยไซเบอร์ภาครัฐ (Practices for Government Cybersecurity)

Generative AI Cybersecurity and Ethics

E-banking, Fintech, _ Financial Crimes The Current Economic and Regulatory Landscape 2024th Edition

Information Security Incident and Data Breach Management A Step-by-Step Approach First Edition

admin

  • AI (75)
    • Ethics (3)
  • Architectures (18)
  • Big Data (3)
  • Blockchain (10)
  • Conference Proceedings (17)
  • cyber psychology (4)
  • Cyber Sovereignty (3)
  • Cyber-Physical (10)
  • Cybersecurity (66)
  • Cybersecurity Architecture (3)
  • Cybersecurity Awareness (1)
  • Cybersecurity Capability Maturity Model (C2M2) (3)
  • Data Analysis (5)
  • Data Science (5)
  • Deep Learning (18)
  • Engineering (6)
  • Frameworks (5)
  • Fuzzy (1)
  • ISO (1)
  • Large language models (LLMs) (3)
  • Machine Learning (47)
  • Management (1)
  • Metaverse (1)
  • NIST Special Publication (3)
  • Other (2)
  • Paper (1)
  • Programming (9)
  • Python (4)
  • Research Report (1)
  • Secure coding (1)
  • Systems Analysis and Design (5)
  • Technology (1)
  • thesis (2)
  • Tools (1)
  • การเขียนเชิงวิชาการ (3)
  • วารสารวิชาการ (1)
  • เอกสารคู่มือ (6)
  • เอกสารอ้างอิง (2)
  • Automate It with Zapier and Generative AI Harness the power of no-code workflow automation and AI
  • Rapid Product Development with n8n: Practical guide to creating digital products on the web using workflow automation and n8n
  • Identity Theft Handbook Detection, Prevention, and Security
  • [ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)
  • CERT Resilience Management Model (CERT-RMM) A Maturity Model for Managing Operational Resilience (SEI Series in Software Engineering)
  • AI Value Creators
  • AI Engineering: Building Applications with Foundation Models
  • Architecting Data and Machine Learning Platforms
  • Coding with AI For Dummies
  • Fundamentals of Enterprise Architecture Proven Frameworks for Effective Architecture Decisions

2014 2016 2017 2018 2019 2020 2021 2022 2023 Academic Academic Writing AI Ariel Evans BERNARD FOX Beyond Security ChatGPT DANIELLE C. TARRAF Data Visualization DGA Dr. Magda Lilia Chelly ECTI ECTI2023 GUY WEICHENBERG JONATHAN WILLIAM WELBURN Mark Sweeney Melissa de Vel-Palumbo MYRON HURA NCCIT NCCIT2020 NCCIT2021 NCCIT2022 NCCIT2023 Neural Networks NIST NSCIC Proceedings Python risk SUZANNE GENC UNESCO Writing Zero Trust ปัญญาประดิษฐ์ มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ แผนพัฒนา

© 2025 ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ - Theme by WPEnjoy · Powered by WordPress