Cyber Security and Business Intelligence (eBook, PDF)
Innovations and Machine Learning for Cyber Risk Management
Redaktion: Abedin, Mohammad Zoynul; Hajek, Petr
42,95 €
42,95 €
inkl. MwSt.
Sofort per Download lieferbar
21 °P sammeln
42,95 €
Als Download kaufen
42,95 €
inkl. MwSt.
Sofort per Download lieferbar
21 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
42,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
21 °P sammeln
Cyber Security and Business Intelligence (eBook, PDF)
Innovations and Machine Learning for Cyber Risk Management
Redaktion: Abedin, Mohammad Zoynul; Hajek, Petr
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 9.88MB
Andere Kunden interessierten sich auch für
- Cyber Security and Business Intelligence (eBook, ePUB)42,95 €
- Artificial Intelligence and Big Data for Financial Risk Management (eBook, PDF)42,95 €
- Paul MartinInsider Risk and Personnel Security (eBook, PDF)37,95 €
- Analytics in Finance and Risk Management (eBook, PDF)52,95 €
- Ewa LechmanThe Diffusion of Information and Communication Technologies (eBook, PDF)42,95 €
- Tara KissoonOptimal Spending on Cybersecurity Measures (eBook, PDF)21,95 €
- Eduardo RodriguezRisk Analytics (eBook, PDF)78,95 €
-
-
-
The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 234
- Erscheinungstermin: 11. Dezember 2023
- Englisch
- ISBN-13: 9781003817789
- Artikelnr.: 69429964
- Verlag: Taylor & Francis
- Seitenzahl: 234
- Erscheinungstermin: 11. Dezember 2023
- Englisch
- ISBN-13: 9781003817789
- Artikelnr.: 69429964
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mohammad Zoynul Abedin is a Senior Lecturer in Finance (FinTech) at the School of Management, Swansea University, UK. Earlier he was a Senior Lecturer in FinTech at Teesside University, UK. He is an experienced data analyst and project evaluator and specializes in fintech, data mining, big data analytics, deep learning, machine learning, energy analytics, sustainability, climate analytics, and implications in 4th Industrial Revolution. Petr Hajek is Professor of system engineering and informatics with the Science and Research Centre, Faculty of Economics and Administration, University of Pardubice. His research interests include soft computing, machine learning, and economic modelling. He is an Associate Editor of four journals.
1. Leveraging Business Intelligence to Enhance Cyber Security Innovation
Sarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana
2. Cyber Risk and the Cost of Unpreparedness of Financial Institutions
Naveenan R.V and Suresh G
3. Cyber Security in Banking Sector
Mohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa
4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation Perspective
Emon Kalyan Chowdhury
5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity Salary
Mahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter
6. Test Plan for Immersive Technology-Based Medical Support System
Mohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert
7. Current Challenges of Hand-Based Biometric Systems
Katerina Prihodova, and Miloslav Hub
8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion Detection
Sad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan
9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model Interpretability
Mahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin
10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020
Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag
11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early Stages
Mahmudul Hasan, Sad Wadi Sajid and Md. Al Amin
12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication
Nahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam
13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly Detection
Md. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan
Sarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana
2. Cyber Risk and the Cost of Unpreparedness of Financial Institutions
Naveenan R.V and Suresh G
3. Cyber Security in Banking Sector
Mohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa
4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation Perspective
Emon Kalyan Chowdhury
5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity Salary
Mahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter
6. Test Plan for Immersive Technology-Based Medical Support System
Mohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert
7. Current Challenges of Hand-Based Biometric Systems
Katerina Prihodova, and Miloslav Hub
8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion Detection
Sad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan
9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model Interpretability
Mahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin
10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020
Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag
11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early Stages
Mahmudul Hasan, Sad Wadi Sajid and Md. Al Amin
12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication
Nahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam
13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly Detection
Md. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan
1. Leveraging Business Intelligence to Enhance Cyber Security Innovation
Sarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana
2. Cyber Risk and the Cost of Unpreparedness of Financial Institutions
Naveenan R.V and Suresh G
3. Cyber Security in Banking Sector
Mohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa
4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation Perspective
Emon Kalyan Chowdhury
5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity Salary
Mahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter
6. Test Plan for Immersive Technology-Based Medical Support System
Mohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert
7. Current Challenges of Hand-Based Biometric Systems
Katerina Prihodova, and Miloslav Hub
8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion Detection
Sad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan
9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model Interpretability
Mahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin
10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020
Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag
11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early Stages
Mahmudul Hasan, Sad Wadi Sajid and Md. Al Amin
12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication
Nahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam
13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly Detection
Md. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan
Sarika Faisal, Syed Far Abid Hossain, Saba Fahmida and Rayisa Rayhana
2. Cyber Risk and the Cost of Unpreparedness of Financial Institutions
Naveenan R.V and Suresh G
3. Cyber Security in Banking Sector
Mohammad Zoynul Abedin, Petr Hajek and Nusrat Afrin Shilpa
4. Is the Application of Blockchain Technology in Accounting Feasible? A Developing Nation Perspective
Emon Kalyan Chowdhury
5. Empirical Analysis of Regression Techniques to Predict the Cybersecurity Salary
Mahmudul Hasan, Md. Mahedi Hassan, Md. Faisal-E-Alam, and Nazrin Akter
6. Test Plan for Immersive Technology-Based Medical Support System
Mohammad Nasfikur R Khan, Bhushan Lohar, Robert Cloutier and Kari J. Lippert
7. Current Challenges of Hand-Based Biometric Systems
Katerina Prihodova, and Miloslav Hub
8. Investigating Machine Learning Algorithms with Model Explainability for Network Intrusion Detection
Sad Wadi Sajid, K.M. Rashid Anjum, Md. Al-Shahariar and Mahmudul Hasan
9. How Much Do the Features Affect the Classifiers on UNSW-NB15? An XAI Equipped Model Interpretability
Mahmudul Hasan, Abdullah Haque, Md Mahmudul Islam and Md Al Amin
10. On the Selection of Suitable Dimensionality Reduction and Data Balancing Techniques to Classify DarkNet Access on CICDarknet2020
Mahmudul Hasan, Ashraful Islam and Ashrafuzzaman Shohag
11. An Effective Three-Layer Network Security to Prevent Distributed Denial of Service (DDoS) Attacks in Early Stages
Mahmudul Hasan, Sad Wadi Sajid and Md. Al Amin
12. Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication
Nahid Binte Sadia, Mahmudul Hasan and Md. Rashedul Islam
13. An Explainable AI-Driven Machine Learning Framework for Cybersecurity Anomaly Detection
Md. Mahedi Hassan, Md. Fahim Abrar and Mahmudul Hasan