Refine your search

Your search returned 303 results.

Sort
Results
81.
Deep learning with R for beginners: Design neural network models in R 3.5 using tensorflow, keras and MXNet Mark Hodnett by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, Packt Publishing, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.31 HOD/D.

82.
Mastering malware analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime and IOT attacks Alexey Kleymenov by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, Packt Publishing, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.8 KLE/M.

83.
Tensorflow 2.0 quick start guide: Get up to speed with the newly introduced features of tensorflow 2.0 Tony Holdroyd by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, Packt Publishing, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.31 HOL/T.

84.
Tensorflow 2.0 quick start guide: Get up to speed with the newly introduced features of tensorflow 2.0 Tony Holdroyd by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Birmingham, Packt Publishing, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.31 HOL/T;1.

85.
Cybersecurity ops with bash: Attack, defend and analyze from the command line Paul Troncone by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Mumbai, O'Reilly/Shroff, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 TRO/C.

86.
Practical cryptography in python: Learning correct cryptography by example Seth James Nielson by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Apress, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (4)Call number: 005.82 NIE/P, ...

87.
Adversarial and uncertain reasoning for adaptive cyber defense: Control and game theoretic approaches to cyber security Sushil Jajodia by Series: Springer Lecture notes in computer science
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 JAJ/A.

88.
Deep learning applications for cyber security Mamoun Alazab by Series: Springer Series in Advanced sciences and technologies for security applications
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.31 ALA/D.

89.
Cyber operations: Building, defending and attacking modern computer networks Mike O'Leary by
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Apress, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 OLE/C.

90.
Analog circuit theory and filter design in the digital world: With an introduction to the morphological method for creative solutions and design by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 621.3815324 MOS/A.

91.
Electronic waste and printed circuit board recycling technologies Muammer Kaya by Series: Springer series in The minerals, metals and materials series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 621.38150286 KAY/E.

92.
Handbook of biometric anti-spoofing: Presentation attack detection Sebastein Marcel, Mark S. Nixon, Julian Fierrez, Nicholas Evans by Series: Springer series in Advances in computer vision and pattern recognition
Edition: 2
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.4 MAR/H.

93.
Selfie biometrics: Advances and challenges Ajita Rattani, Reza Derakhshani,, Arun Ross by Series: Springer series in Advances in computer vision and pattern recognition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.4 RAT/S.

94.
Blockchain for distributed security Sachin S Shetty, Charles A. Kamhoua, Laurent L. Njilla (Eds.) by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New Jersey, Wiley, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 332.178 SHE/B.

95.
Internet of things security and data protection by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Switzerland, Springer, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 004.62 ZIE/I.

96.
Beginning anomaly detection using python based deep learning: With Keras and pytorch by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, Apress, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 006.31 ALL/B.

97.
Rewired: Cybersecurity governance by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: USA, Wiley, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 ELL/R.

98.
Malcious bots: An inside look into the cyber-criminal underground of the internet Ken Dunham, Jim Melnick by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boca Raton, CRC Press, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 005.82 DUN/M.

99.
Extending moores law through advanced semiconductor design and processing techniques by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, CRC Press, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 621.395 LAM/E.

100.
Nanoscale devices: Physics, modeling, and their application by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, CRC Press, 2019
Availability: Items available for loan: Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre (1)Call number: 621.381 KAU/N.

Pages