Search Results for - Narrowed by: Computer security. - Electronic videos. - Intelligence artificielle. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electronic$002bvideos.$002509Electronic$002bvideos.$0026qf$003dSUBJECT$002509Subject$002509Intelligence$002bartificielle.$002509Intelligence$002bartificielle.$0026ps$003d300? 2024-09-27T10:36:08Z Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2024-09-27T10:36:08Z 2024-09-27T10:36:08Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-09-27T10:36:08Z 2024-09-27T10:36:08Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/>