Digital Leadership Framework

Read more

Quantum Machine Learning

Read more

Resilient Cybersecurity Reconstruct your defense strategy in an evolving cyber world

Read more

AI-Playbook-for-Research-CRO-and-Experimentation

Read more

A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 Strategies, Implementation, and Best Practice

Read more

Preparing for Hybrid Threats to Security Collaborative Preparedness and Response

Read more

An Introduction to Statistical Learning: with Applications in Python

Read more

The Hundred-Page Machine Learning Book

Read more

INTRODUCTION TO MACHINE LEARNING

Read more

Digital Sovereignty in Cyber Security

Read more

Cyberspace Sovereignty

Read more

Rethinking Sovereignty in the Context of Cyberspace

Read more

ChatGPT and Bard for Business Automation Achieving AI-Driven Growth

Read more

Artificial Intelligence Solutions for Cyber-Physical Systems

Read more

System Development Life Cycle Manual – Applications Systems

Read more

Software Engineering A Practitioner’s Approach

Read more

Real-Time Systems Design and Analysis

Read more

Systems Analysis and Design

Read more

Agile Transformation How to Successfully Shape Your Transition to a More Agile Organization

Read more

Physical.Systems.Foundations.and.Techniques.Jun.2022

Read more

Building The Data Warehouse (2005)

Read more

Cyber SecurityIntelligence and Analytics (CSIA 2022), Volume 1

Read more

Web Development and Design Foundations with HTML5

Read more

An Introduction to Ethics in Robotics and AI

Read more

AI Ethics

Read more

Ai-assisted Programming: Better Planning, Coding, Testing, and Deployment

Read more

Artificial Psychology_ Psychological Modeling and Testing of AI Systems

Read more

Artificial Intelligence A Modern Approach 4th Edition

Read more

NIST Special Publication 800-115 – Technical Guide to Information Security Testing and Assessment

Read more

An Introduction to Cyberpsychology

Read more

The Oxford Handbook of Cyberpsychology

Read more

Introduction to Cyber Forensic Psychology Understanding the Mind of the Cyber Deviant Perpetrators

Read more

Secrets of a Cyber Security Architect

Read more

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture Volume II

Read more

Hands-on cybersecurity for architects plan and design robust security architectures

Read more

Enterprise Architecture and Information Assurance Developing a Secure Foundation

Read more

Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Against Advanced Threats

Read more

แผนการพัฒนาวิทยาศาสตร์และเทคโนโลยีป้องกันประเทศ 2566-2570

Read more

คู่มือใช้งาน Microsoft Office 365 (ฉบับผู้ใช้งาน)

Read more

OWASP_Code_Review_Guide_v2

Read more

NIST Special Publication 1500-201

Read more

Guardrails Guiding Human Decisions in the Age of AI

Read more

Sectoral Cybersecurity Maturity Model

Read more

Cybersecurity Capability Maturity Model (C2M2) Version 2.1 June 2022

Read more

Implementing the Capability Maturity Model

Read more

Secure and Smart Cyber-Physical Systems

Read more

AI Ethics A Complete Guide – 2021 Edition

Read more

Enterprise security architecture a business-driven approach

Read more

Getting Started with Enterprise Architecture A Practical and Pragmatic Approach to Learning the Basics of Enterprise Architecture

Read more

The Practice of Enterprise Architecture A Modern Approach to Business and IT Alignment

Read more