ei ole lubatud
ei ole lubatud
Digitaalõiguste kaitse (DRM)
Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).
Vajalik tarkvara
Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)
PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )
Seda e-raamatut ei saa lugeda Amazon Kindle's.
1. Leveraging Business Intelligence to Enhance Cyber Security Innovation
Sarika Faisal, Syed Far Abid Hossain,
Saba Fahmida and Rayisa Rayhana
2. Cyber Risk and the Cost of Unpreparedness of Financial Institutions
Naveenan R.V and Suresh G
3. Cyber Security in Banking Sector
Mohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa
4. Is Application of Blockchain Technology in the Field of Accounting Feasible? A Developing Nation Perspective
Emon Kalyan Chowdhury
5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity Salary
Mahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter
6. Test Plan for Immersive Technology-Based Medical Support System
Mohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert
7. Current Challenges of Hand-Based Biometric Systems
Katerina Prihodova, and Miloslav Hub
8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion Detection
Sad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan
9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model Interpretability
Mahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin
10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020
Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag
11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early Stages
Mahmudul Hasan, Sad Wadi Sajid and Md. Al Amin
12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication
Nahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam
13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly Detection
Md. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan