Homeland and territorial security with AI: Aitek 6 knowledge cartridge
()
Unavailable in your country
Unavailable in your country
About this ebook
Bruno Ciroussel
Bruno Ciroussel, born in Lyon in 1964, is a french and swiss businessman. He is an engineer and author of the "Aitek methodology" dedicated to Auto-ML, now in its 6th edition, and has implemented his methodology in an universal Auto-ML platform: the "Aitek Engine", applicable in multiple functional domains such as banking, insurance, healthcare, logistics and telecom. He has also adapted his Aitek platform for deployment in the territorial surveillance, Homeland, and customs security sectors and delivered. Bruno Ciroussel is also author, lecturer and speaker on various issues encompassing Artificial Intelligence, Machine Learning as well as the impact of these and other technologies on business, security, gover-nment, and the democratic system.
Related to Homeland and territorial security with AI
Related ebooks
Application Design: Key Principles For Data-Intensive App Systems Rating: 0 out of 5 stars0 ratingsSoftware-Defined Cloud Centers: Operational and Management Technologies and Tools Rating: 0 out of 5 stars0 ratingsPredictive Maintenance in Smart Factories: Architectures, Methodologies, and Use-cases Rating: 0 out of 5 stars0 ratingsMainframe Revolution: Harnessing AI for Next-Gen Computing: Mainframes Rating: 0 out of 5 stars0 ratingsAI for Healthcare with Keras and Tensorflow 2.0: Design, Develop, and Deploy Machine Learning Models Using Healthcare Data Rating: 0 out of 5 stars0 ratingsBig Data for Enterprise Architects Rating: 5 out of 5 stars5/5AI in Healthcare: How Artificial Intelligence Is Changing IT Operations and Infrastructure Services Rating: 0 out of 5 stars0 ratingsLearning RSLogix 5000 Programming Rating: 5 out of 5 stars5/5Architecting Big Data & Analytics Solutions - Integrated with IoT & Cloud Rating: 5 out of 5 stars5/5Smarter Data Science: Succeeding with Enterprise-Grade Data and AI Projects Rating: 0 out of 5 stars0 ratingsEdge Computing 101: Novice To Pro: Expert Techniques And Practical Applications Rating: 0 out of 5 stars0 ratingsEmbedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development Rating: 5 out of 5 stars5/5Enterprise Architecture for Global Companies in a Digital IT Era: Adaptive Integrated Digital Architecture Framework (AIDAF) Rating: 0 out of 5 stars0 ratingsArtificial Intelligence in Program and Project Management Rating: 0 out of 5 stars0 ratingsGoogle Cloud Platform for Data Engineering: From Beginner to Data Engineer using Google Cloud Platform Rating: 5 out of 5 stars5/5Cognitive Computing and Big Data Analytics Rating: 0 out of 5 stars0 ratingseMaintenance: Essential Electronic Tools for Efficiency Rating: 0 out of 5 stars0 ratingsBuilding and Operating Data Hubs: Using a practical Framework as Toolset Rating: 0 out of 5 stars0 ratingsEncapsulating Legacy: A Guide to Service-Oriented Architecture in Mainframe Systems: Mainframes Rating: 0 out of 5 stars0 ratingsOpenStack Orchestration Rating: 5 out of 5 stars5/5From Big Data to Smart Data Rating: 0 out of 5 stars0 ratingsSecure Intelligent Machines: Protecting AI from Cyberattack Rating: 0 out of 5 stars0 ratingsBe Data Curious!: Be Data Curious!, #1 Rating: 0 out of 5 stars0 ratingsIoT Standards with Blockchain: Enterprise Methodology for Internet of Things Rating: 0 out of 5 stars0 ratingsInterfacing PIC Microcontrollers: Embedded Design by Interactive Simulation Rating: 0 out of 5 stars0 ratingsMastering Business Intelligence with MicroStrategy Rating: 0 out of 5 stars0 ratingsMonitoring Cloud-Native Applications: Lead Agile Operations Confidently Using Open Source Software Rating: 0 out of 5 stars0 ratingsSeeding the Cloud: The Genesis of Infrastructure as Code Rating: 0 out of 5 stars0 ratingsReal-Time Analytics: Techniques to Analyze and Visualize Streaming Data Rating: 0 out of 5 stars0 ratings"Big Data Science" Basic Concepts and Applications Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCodes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratings
Reviews for Homeland and territorial security with AI
0 ratings0 reviews