Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (wells OR well)
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"000 - Computer science, information & general works"
dewey-ones:"364 - Criminology"
Search alternatives
:
wells »
cells
,
tells
Showing
1
-
7
of
7
Search:
'(wells OR well)'
,
query time: 0.28s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Who are the bad guys and what do they want?
by
Fell, Gregory J.
,
Barlow, Mike
Published 2016
O'Reilly Media
“
... and
well
. According to Center for Strategic and International Studies, cyber crime and cyber espionage cost...
”
Call Number:
HV6773
Read Now
2
Cybersecurity attacks (Red Team activity)
by
Nesterenko, Sergii
Published 2018
Packt
“
... harm they can do. Then
we'll
look at another attack vector: websites and web-applications. You'll see...
”
Call Number:
QA76.9.A25
Read Now
3
Fraud detection without feature engineering
by
Vagata, Pamela
Published 2019
O'Reilly
“
... already had a
well
-tuned feature-engineered model for comparison. Stripe found that the deep learning...
”
Call Number:
QA76.9.A25
Read Now
4
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations
by
Liska, Allan
Published 2018
O'Reilly Media
“
... abreast of current as
well
as future threats. Understand exactly what threat intelligence is, and how...
”
Call Number:
HV6773
Read Now
5
Fighting financial crimes with artificial intelligence
by
Kureishy, Atif
,
Moss, Simon
Published 2019
O'Reilly Media
“
... of AI models as
well
as the difficulties of putting them into practice. With this report, you'll explore...
”
Call Number:
HV6768
Read Now
6
Post-incident reviews : learning from failure for improved incident response
by
Hand, Jason
Published 2017
O'Reilly Media
“
... analyses don't work
well
in modern IT organizations, mainly because the command-and-control approach offers...
”
Call Number:
QA76.9.A25
Read Now
7
Biometric Identification, Law and Ethics
by
Smith, Marcus
Published 2021
Springer Nature
“
... of contemporary biometrics-fingerprint recognition, facial recognition and DNA identification- as
well
...
”
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 000 - Computer science, information & general works
Clear Filter
Classification: 364 - Criminology
Year of Publication
From:
To:
Classification
000 - Computer science, information & general works
364 - Criminology
331 - Labor economics
4
100 - Philosophy & psychology
1
170 - Ethics
1
200 - Religion
1
more ...
300 - Social sciences
1
301 - Sociology & anthropology
1
320 - Political science
1
330 - Economics
1
338 - Production
1
340 - Law
1
360 - Social problems & services; associations
1
361 - Social problems & social welfare in general
1
600 - Technology
1
700 - The arts; fine & decorative arts
1
see all ...
less ...
Language
English
7
Collection
O'Reilly
6
Directory of Open Access Books
1
Author
Barlow, Mike
1
Fell, Gregory J.
1
Hand, Jason
1
Kureishy, Atif
1
Liska, Allan
1
Miller, Seumas
1
more ...
Moss, Simon
1
Nesterenko, Sergii
1
Smith, Marcus
1
Vagata, Pamela
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22000+-+Computer+science%2C+information+%26+general+works%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&lookfor=%28wells+OR+well%29&type=AllFields
Send by Email
×
Loading...