0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations (Hardcover): Dinesh C.... Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations (Hardcover)
Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh
R8,195 Discovery Miles 81 950 Ships in 12 - 17 working days

In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in social networks, cloud, and the internet of things (IoT)-based technologies, the requirement for a strong cyber security system, particularly in the healthcare sector, is increasing. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations provides a comprehensive review of techniques and applications of Industry 5.0-enabled intelligent healthcare-centric cyber security. The goal of this book is to close the gap between AI and cyber security. Covering topics such as malicious activity, the dark web, and smart healthcare systems, this premier reference source is an essential resource for healthcare administrators, IT managers, system developers, system architects, IT specialists, students and educators of higher education, librarians, researchers, and academicians.

Machine Learning for Cyber Security (Hardcover): Preeti Malik, Lata Nautiyal, Mangey Ram Machine Learning for Cyber Security (Hardcover)
Preeti Malik, Lata Nautiyal, Mangey Ram
R4,718 Discovery Miles 47 180 Ships in 12 - 17 working days

This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lucky Metal Cut Throat Razer Carrier
R30 R18 Discovery Miles 180
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Versailles - Season 3
George Blagden, Alexander Vlahos DVD R172 Discovery Miles 1 720
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Efekto Karbadust Insecticide Dusting…
R54 Discovery Miles 540
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Fine Living Focus Office Desk Chair…
R999 R699 Discovery Miles 6 990
Ultimate Cookies & Cupcakes For Kids
Hinkler Pty Ltd Kit R299 R234 Discovery Miles 2 340
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
First Aid Dressing No 3
R5 R1 Discovery Miles 10

 

Partners