1181. 10 machine learning blueprints you should know for cybersecurity : protect your network and data with cutting-edge ai techniques & projects to boost your cybersecurity defenses /: protect your network and data with cutting-edge ai techniques & projects to boost your cybersecurity defenses. (2023) Authors: Oak, Rajvardhan Record Type: Book Extent: 1 online resource (359 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1182. Building next-gen SOC with IBM QRadar : accelerate your security operations and detect cyber threats effectively /: accelerate your security operations and detect cyber threats effectively. (2023) Authors: Kothekar, Ashish Other Names: Patil, Sandeep writer of supplementary textual content. Record Type: Book Extent: 1 online resource (183 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1183. The zero trust framework : threat hunting & quantum mechanics /: threat hunting & quantum mechanics. (2023) Authors: Das, Ravindra Record Type: Book Extent: 1 online resource (152 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1184. Cybersecurity for decision makers. (2023) Editors: Vajjhala, Narasimha, 1978-; Strang, Kenneth David, 1962- Record Type: Book Extent: 1 online resource (432 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1185. Evolution of the cyber domain : the implications for national and global security /: the implications for national and global security. (2023) Editors: Tikk-Ringas, Eneken Record Type: Book Extent: 1 online resource, illustrations (black and white, and colour), maps (black and white, and colour) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1186. Security orchestration, automation and response for security analysts : learn the secrets of SOAR to improve MTTA and MTTR and strengthen your security posture /: learn the secrets of SOAR to improve MTTA and MTTR and strengthen your security posture. (2023) Authors: Kovacevic, Benjamin Other Names: DiCola, Nicholas writer of supplementary textual content. Record Type: Book Extent: 1 online resource (312 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1187. Security-first compliance for small businesses. (2023) Authors: Walsh, Karen M Record Type: Book Extent: 1 online resource (200 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1188. Practical insecurity : the layman's guide to digital security and digital self-defense /: the layman's guide to digital security and digital self-defense. (2023) Authors: Marshall, Lyndon Record Type: Book Extent: 1 online resource (180 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1189. Mastering Microsoft 365 defender : implement Microsoft Defender for endpoint, Intune, cloud apps, and Office 365 and respond to threats /: implement Microsoft Defender for endpoint, Intune, cloud apps, and Office 365 and respond to threats. (2023) Authors: Campbell, Ruairidh; Hedberg, Viktor Record Type: Book Extent: 1 online resource (624 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1190. Instant Kali Linux. (2013) Other Names: Singh, Abhinav Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗