Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context

Posted By: AvaxGenius
Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context

Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context by Leonhard Kunczik
English | EPUB | 2022 | 145 Pages | ISBN : 3658376155 | 12.2 MB

This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender scenarios. Reinforcement Learning has proven its capabilities in different challenging optimization problems and is now an established method in Operations Research. However, complex attacker-defender scenarios have several characteristics that challenge Reinforcement Learning algorithms, requiring enormous computational power to obtain the optimal solution.

White-Collar Crime Online: Deviance, Organizational Behaviour and Risk

Posted By: AvaxGenius
White-Collar Crime Online: Deviance, Organizational Behaviour and Risk

White-Collar Crime Online: Deviance, Organizational Behaviour and Risk by Petter Gottschalk
English | EPUB | 2022 | 330 Pages | ISBN : 3030821315 | 2.1 MB

his initiating monograph provides the first thorough examination of the concept of white-collar crime online. Applying an offender-based perspective which considers the central role of convenience, it seeks to inform, improve and develop the current literature on cybercrime, whilst paying particular attention to its founding category within criminology.

Cybercrime and Information Technology

Posted By: sasha82
Cybercrime and Information Technology

Cybercrime and Information Technology by Alex Alexandrou
October 28, 2021 | ISBN: 1032053852, 0367251574 | English | 338 pages | EPUB | 16 MB

Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

Posted By: AvaxGenius
Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime by Thomas H. Lenhard
English | PDF,EPUB | 2022 | 114 Pages | ISBN : 3658354933 | 7 MB

Using many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats.

Critical Concepts, Standards, and Techniques in Cyber Forensics

Posted By: readerXXI
Critical Concepts, Standards, and Techniques in Cyber Forensics

Critical Concepts, Standards, and Techniques in Cyber Forensics
by Mohammad Shahid Husain and Mohammad Zunnun Khan
English | 2020 | ISBN: 1799815587 | 316 Pages | True PDF | 6.2 MB

Critical Concepts, Standards, and Techniques in Cyber Forensics

Posted By: readerXXI
Critical Concepts, Standards, and Techniques in Cyber Forensics

Critical Concepts, Standards, and Techniques in Cyber Forensics
by Mohammad Shahid Husain and Mohammad Zunnun Khan
English | 2020 | ISBN: 1799815587 | 316 Pages | True ePUB | 6.26 MB

The CISO’s Transformation: Security Leadership in a High Threat Landscape

Posted By: AvaxGenius
The CISO’s Transformation: Security Leadership in a High Threat Landscape

The CISO’s Transformation: Security Leadership in a High Threat Landscape by Raj Badhwar
English | PDF,EPUB | 2021 | 180 Pages | ISBN : 3030814114 | 5.6 MB

The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book.