Israel and the Cyber Threat How the Startup Nation Became a Global Cyber Power

Read more

Next-Generation Sequencing Data Analysis 2nd Edition

Read more

Qualitative Content Analysis Methods, Practice and Software 2nd Edition

Read more

BLOCKCHAIN – Cybrosys Limited Edition

Read more

เทคโนโลยีปัญญาประดิษฐ์

Read more

Blockchain for Government Services

Read more

AI Government Framework

Read more

Mastering Kali Linux for Advanced Penetration Testing – Beggs, Robert

Read more

Digital Thailand AI Ethics Principle and Guideline

Read more

Cybercrime Prevention Theory and Applications

Read more

Cyber Threat Intelligence

Read more

OWASP CODE REVIEW GUIDE 2008 V1.1

Read more

Thai ChatGPT: Pretrained Large Language Models

Read more

Data Science From Scratch Learning

Read more

Risk Assessment Using NIST SP 800-30 Revision 1 and ISO 27005 Combination Technique in Profit-Based Organization: Case Study of ZZZ Information System Application in ABC Agency

Read more

NIST Special Publication 800-30 Guide for Conducting Risk Assessments I N F O R M A T I O N S E C U R I T Y

Read more

Understand, Manage, and Measure Cyber Risk

Read more

How to Measure Anything in Cybersecurity Risk

Read more

The 19th National Conference on Computing and Information Technology (NCCIT 2023) NCCIT2023_E-Proceedings

The 19th National Conference o… Read more

Effective Academic Writing 3

Read more

First Steps in Academic Writing Level 2

Read more

Academic Writing for Graduate Students_ Essential Tasks and Skills

Read more

เอกสารประกอบการบรรยาย งานสัมมนาให้ความรู้เกี่ยวกับ Zero Trust ในงานชื่อ Beyond Security: Zero Trust for Business Enablement

เอกสารประกอบการบรรยาย งานสัมมน… Read more

100 Practical Applications and Use Cases of Generative AI

Read more