Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1919
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Leslie F. Sikos | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:34:27Z | - |
dc.date.available | 2020-05-17T08:34:27Z | - |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1919 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.publisher | Springer | en_US |
dc.relation.haspart | 9783319988429.pdf | en_US |
dc.title | AI in Cybersecurity | en_US |
dc.type | Book | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319988429.pdf | 6.4 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Leslie F. Sikos | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:34:27Z | - |
dc.date.available | 2020-05-17T08:34:27Z | - |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1919 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.publisher | Springer | en_US |
dc.relation.haspart | 9783319988429.pdf | en_US |
dc.title | AI in Cybersecurity | en_US |
dc.type | Book | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319988429.pdf | 6.4 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Leslie F. Sikos | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:34:27Z | - |
dc.date.available | 2020-05-17T08:34:27Z | - |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1919 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.publisher | Springer | en_US |
dc.relation.haspart | 9783319988429.pdf | en_US |
dc.title | AI in Cybersecurity | en_US |
dc.type | Book | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319988429.pdf | 6.4 MB | Adobe PDF | Preview File |