logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Artificial Intelligence In Cyber Security Theories And Applications Tushar Bhardwaj

  • SKU: BELL-52792404
Artificial Intelligence In Cyber Security Theories And Applications Tushar Bhardwaj
$ 31.00 $ 45.00 (-31%)

4.0

6 reviews

Artificial Intelligence In Cyber Security Theories And Applications Tushar Bhardwaj instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 3.59 MB
Pages: 148
Author: Tushar Bhardwaj, Himanshu Upadhyay, Tarun Kumar Sharma, Steven Lawrence Fernandes
ISBN: 9783031285806, 3031285808
Language: English
Year: 2023

Product desciption

Artificial Intelligence In Cyber Security Theories And Applications Tushar Bhardwaj by Tushar Bhardwaj, Himanshu Upadhyay, Tarun Kumar Sharma, Steven Lawrence Fernandes 9783031285806, 3031285808 instant download after payment.

This book highlights the applications and theory of artificial intelligence in the domain of cybersecurity. The book proposes new approaches and ideas to present applications of innovative approaches in real-time environments. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, blockchain) for solving complex and intricate problems arising in the domain of cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. This book serves as a reference for young scholars, researchers, and industry professionals working in the field of Artificial Intelligence and Cybersecurity.

Related Products