Machine Learning for High-Risk Applications Approaches to Responsible AI

Read more

Building an Event-Driven Data Mesh Patterns for Designing _ Building Event-Driven Architectures

Read more

Security Risk Management – The Driving Force for Operational Resilience The Firefighting Paradox

Read more

Generative Deep Learning Teaching Machines To Paint, Write, Compose, and Play 2nd Edition

Read more

A Beginner’s Guide to Structural Equation Modeling

Read more

Web Scraping with Python

Read more

Natural Language Processing with Python

Read more

Deep Learning with PyTorch

Read more

Statistical and Machine-Learning Data Mining

Read more

Hands-On Machine Learning with Scikit-Learn and TensorFlow

Read more

Introduction to Machine Learning with Python

Read more

Israel and the Cyber Threat How the Startup Nation Became a Global Cyber Power

Read more

Next-Generation Sequencing Data Analysis 2nd Edition

Read more

Blockchain for Real World Applications

Read more

Qualitative Content Analysis Methods, Practice and Software 2nd Edition

Read more

BLOCKCHAIN – Cybrosys Limited Edition

Read more

เทคโนโลยีปัญญาประดิษฐ์

Read more

Blockchain for Government Services

Read more

AI Government Framework

Read more

Mastering Kali Linux for Advanced Penetration Testing – Beggs, Robert

Read more

Digital Thailand AI Ethics Principle and Guideline

Read more

Cybercrime Prevention Theory and Applications

Read more

Cyber Threat Intelligence

Read more

OWASP CODE REVIEW GUIDE 2008 V1.1

Read more

Thai ChatGPT: Pretrained Large Language Models

Read more

Data Science From Scratch Learning

Read more

Risk Assessment Using NIST SP 800-30 Revision 1 and ISO 27005 Combination Technique in Profit-Based Organization: Case Study of ZZZ Information System Application in ABC Agency

Read more

NIST Special Publication 800-30 Guide for Conducting Risk Assessments I N F O R M A T I O N S E C U R I T Y

Read more

Understand, Manage, and Measure Cyber Risk

Read more

How to Measure Anything in Cybersecurity Risk

Read more

The 19th National Conference on Computing and Information Technology (NCCIT 2023) NCCIT2023_E-Proceedings

The 19th National Conference o… Read more

Effective Academic Writing 3

Read more

First Steps in Academic Writing Level 2

Read more

Academic Writing for Graduate Students_ Essential Tasks and Skills

Read more

แผนปฏิบัติการด้านปัญญาประดิษฐ์แห่งชาติเพื่อการพัฒนาประเทศไทย (พ.ศ. ๒๕๖๕ – ๒๕๗๐)

Read more

CYBER RESILIENCE STRATEGY: A KEY GUIDE TO ENTERPRISE OPERATIONS IN DIGITAL AGE – กลยุทธ์การคืนสภาพได้ทางไซเบอร์: แนวทางในการดำเนินงานขององค์กรในยุคดิจิทัล

Read more

Data Visualization for Business Decisions 3rd Edition A Laboratory Manual

Read more

เอกสารประกอบการบรรยาย งานสัมมนาให้ความรู้เกี่ยวกับ Zero Trust ในงานชื่อ Beyond Security: Zero Trust for Business Enablement

เอกสารประกอบการบรรยาย งานสัมมน… Read more

Practical Malware Analysis

Read more

100 Practical Applications and Use Cases of Generative AI

Read more

Sucuri 2022 Website Threat Research Report

Read more

Machine Learning Cheat Sheet

Read more

Technology Readiness Level-TRL

Read more

A First Course in Artificial Intelligence

Read more

ChatGPT and Artificial Intelligence in higher education: Quick start guide

Read more

Abstract Proceeding ECTI-CARD 2023

Read more

Cyber Strategy_ Risk-Driven Security and Resiliency

Read more

Building a Cyber Resilient Business_ A cyber handbook for executives and boards

Read more

Cyber Resilient Organization

Read more

Measuring Cybersecurity and Cyber Resiliency

Read more