Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Cybersecurity Landscape is for sure changing. The advent of Generative AI is making this much worse. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book.
The Cybersecurity Landscape is for sure changing. The advent of Generative AI is making this much worse. But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Ravi Das is a technical writer in the Cybersecurity realm. He also does Cybersecurity consulting on the side through his private practice, M L Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC(2).
Inhaltsangabe
Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence Neural Networks and Machine Learning. Chapter 3 Introduction to Generative AI Natural Language Processing and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.
Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning. Chapter 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.
Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence Neural Networks and Machine Learning. Chapter 3 Introduction to Generative AI Natural Language Processing and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.
Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning. Chapter 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826