Search Results for - Narrowed by: Computer security. - Electronic videos. - Intelligence artificielle.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bvideos.$002509Electronic$002bvideos.$0026qf$003dSUBJECT$002509Subject$002509Intelligence$002bartificielle.$002509Intelligence$002bartificielle.$0026ps$003d300?
2024-09-27T10:36:08Z
Generative malware outbreak detection
ent://SD_ILS/0/SD_ILS:2325158
2024-09-27T10:36:08Z
2024-09-27T10:36:08Z
by Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format: Electronic Resources<br/>
How to build privacy and security into deep learning models
ent://SD_ILS/0/SD_ILS:2322791
2024-09-27T10:36:08Z
2024-09-27T10:36:08Z
by Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format: Electronic Resources<br/>