Books on the topic 'Intelligence artificielle – Mesures de sécurité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Intelligence artificielle – Mesures de sécurité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Eltaher, Hassan M. Aviation & maritime security intelligence. Ottawa: E&W Communications, 2012.
Find full textCanada. Dept. of Foreign Affairs and International Trade. Defence : agreement between the parties to the North Atlantic Treaty for the security of information (with annexes), Brussels, March 6, 1997, signed by Canada June 17, 1998, ratified by Canada July 17, 1998, in force August 16, 1998 =: Défense : accord sur la sécurité des informations entre les parties au Traité de l'Atlantique Nord (avec annexes), Bruxelles, le 6 mars 1997, signé par le Canada le 17 juin 1998, ratification du Canada le 17 juillet 1998, en vigueur le 16 août 1998. Ottawa, Ont: Minister of Public Works and Government Services Canada = Ministre des travaux publics et services gouvernementaux Canada, 1998.
Find full textYampolskiy, Roman V. Artificial Superintelligence: A Futuristic Approach. Taylor & Francis Group, 2015.
Find full textYampolskiy, Roman V. Artificial Superintelligence: A Futuristic Approach. Taylor & Francis Group, 2015.
Find full textArtificial Superintelligence: A Futuristic Approach. Taylor & Francis Group, 2017.
Find full textChristian, Brian. Alignment Problem: How Can Artificial Intelligence Learn Human Values? Atlantic Books, Limited, 2021.
Find full textChristian, Brian. The Alignment Problem: Machine Learning and Human Values. W. W. Norton & Company, 2020.
Find full textChristian, Brian. Alignment Problem: Machine Learning and Human Values. Norton & Company, Incorporated, W. W., 2020.
Find full textChristian, Brian. The Alignment Problem: How Can Machines Learn Human Values? Atlantic Books, 2021.
Find full textChristian, Brian. Alignment Problem: How Can Machines Learn Human Values? Atlantic Books, Limited, 2021.
Find full textChristian, Brian. The Alignment Problem: Machine Learning and Human Values. Brilliance Audio, 2020.
Find full textBusiness Security: Over 50 Ways To Protect Your Business! Crary Pubns, 2004.
Find full textCyber Crime Security And Digital Intelligence. Gower Publishing Ltd, 2013.
Find full textSecuring IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Find full textKhan, Firoz, T. Poongodi, Alagan Anpalagan, and Vijayalakshmi Saravanan. Securing IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Find full textKhan, Firoz, T. Poongodi, Alagan Anpalagan, and Vijayalakshmi Saravanan. Securing Iot and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Find full textKhan, Firoz, T. Poongodi, Alagan Anpalagan, and Vijayalakshmi Saravanan. Securing IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Find full textArtificial intelligence and the future of testing. Hillsdale, N.J: L. Erlbaum Associates, 1990.
Find full textArtificial intelligence and the future of testing. Hillsdale, N.J: L. Erlbaum Associates, 1990.
Find full textCrump, Justin. Corporate Security Intelligence and Strategic Decision Making. Taylor & Francis Group, 2015.
Find full textCrump, Justin. Corporate Security Intelligence and Strategic Decision Making. Taylor & Francis Group, 2015.
Find full textCorporate Security Intelligence and Strategic Decision-Making. Taylor & Francis Group, 2015.
Find full textPractical AI for Cybersecurity. Auerbach Publishers, Incorporated, 2021.
Find full textDas, Ravi. Practical AI for Cybersecurity. Auerbach Publishers, Incorporated, 2021.
Find full textDas, Ravi. Practical AI for Cybersecurity. Auerbach Publishers, Incorporated, 2021.
Find full textPathan, Al-Sakib Khan, Danda B. Rawat, Uttam Ghosh, and Raja Datta. Internet of Things and Secure Smart Environments: Successes and Pitfalls. CRC Press LLC, 2022.
Find full textPathan, Al-Sakib Khan, Danda B. Rawat, Uttam Ghosh, and Raja Datta. Internet of Things and Secure Smart Environments: Successes and Pitfalls. Taylor & Francis Group, 2020.
Find full textPathan, Al-Sakib Khan, Danda B. Rawat, Uttam Ghosh, and Raja Datta. Internet of Things and Secure Smart Environments: Successes and Pitfalls. Taylor & Francis Group, 2020.
Find full textPathan, Al-Sakib Khan, Danda B. Rawat, Uttam Ghosh, and Raja Datta. Internet of Things and Secure Smart Environments: Successes and Pitfalls. Taylor & Francis Group, 2020.
Find full textPathan, Al-Sakib Khan, Danda B. Rawat, Uttam Ghosh, and Raja Datta. Internet of Things and Secure Smart Environments. Taylor & Francis Group, 2020.
Find full textInternet of Things and Secure Smart Environments: Successes and Pitfalls. Taylor & Francis Group, 2020.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textSaini, Dinesh Kumar, Nguyen Ha Huy Cuong, and Gautam Kumar. Cyber Defense Mechanisms: Security, Privacy, and Challenges. CRC Press LLC, 2021.
Find full textCyber Defense Mechanisms: Security, Privacy, and Challenges. Taylor & Francis Group, 2020.
Find full textAppel, Edward J. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition. Taylor & Francis Group, 2014.
Find full textAppel, Edward J. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition. Taylor & Francis Group, 2014.
Find full textCybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition. Taylor & Francis Group, 2014.
Find full textIntercept: The Secret History of Computers and Spies. Orion Publishing Group, Limited, 2016.
Find full textIntercept. Orion Publishing Group, Limited, 2015.
Find full textIntercept. Orion Publishing Group, Limited, 2015.
Find full textUS National Cybersecurity: International Politics, Concepts and Organization. Routledge, 2017.
Find full textBrantly, Aaron, and Damien Van Puyvelde. US National Cybersecurity: International Politics, Concepts and Organization. Taylor & Francis Group, 2017.
Find full textBrantly, Aaron, and Damien Van Puyvelde. US National Cybersecurity: International Politics, Concepts and Organization. Taylor & Francis Group, 2017.
Find full textBrantly, Aaron, and Damien Van Puyvelde. US National Cybersecurity: International Politics, Concepts and Organization. Taylor & Francis Group, 2019.
Find full textBrantly, Aaron, and Damien Van Puyvelde. US National Cybersecurity: International Politics, Concepts and Organization. Taylor & Francis Group, 2017.
Find full textInformation security governance simplified: From the boardroom to the keyboard. Boca Raton: CRC Press, 2011.
Find full textFitzgerald, Todd. Information Security Governance Simplified: From the Boardroom to the Keyboard. Taylor & Francis Group, 2016.
Find full textFitzgerald, Todd. Information Security Governance Simplified: From the Boardroom to the Keyboard. Taylor & Francis, 2011.
Find full textFitzgerald, Todd. Information Security Governance Simplified: From the Boardroom to the Keyboard. Taylor & Francis Group, 2016.
Find full text