548 |
IAPP CIPP / US Certified Information Privacy Professional Study Guide |
Global Wiley |
Computing and Processing |
2021 |
Open
|
197 |
Identifying and Mitigating the Security Risks of Generative AI |
Global Now |
Computing and Processing |
2024 |
Open
|
198 |
Image Alignment and Stitching: A Tutorial |
Global Now |
Computing and Processing; Signal Processing and Analysis |
2006 |
Open
|
199 |
Image and Video Matting: A Survey |
Global Now |
Computing and Processing; Signal Processing and Analysis |
2008 |
Open
|
200 |
Image-Based Rendering |
Global Now |
Computing and Processing |
2007 |
Open
|
549 |
Implementing Cryptography Using Python |
Global Wiley |
Computing and Processing |
2020 |
Open
|
201 |
Improving HCI with Brain Input: Review, Trends, and Outlook |
Global Now |
Computing and Processing |
2021 |
Open
|
202 |
Incidence Theorems and Their Applications |
Global Now |
General Topics for Engineers |
2012 |
Open
|
203 |
Inclusive Security: Digital Security Meets Web Science |
Global Now |
Computing and Processing; General Topics for Engineers |
2020 |
Open
|
204 |
Information Discovery in E-commerce |
Global Now |
Computing and Processing; General Topics for Engineers |
2025 |
Open
|
550 |
Information Evaluation |
Global Wiley |
Computing and Processing; General Topics for Engineers |
2014 |
Open
|
205 |
Information Extraction |
Global Now |
Computing and Processing |
2008 |
Open
|
551 |
Information Quality: The Potential of Data and Analytics to Generate Knowledge |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2017 |
Open
|
206 |
Information Retrieval for E-Discovery |
Global Now |
Computing and Processing |
2013 |
Open
|
207 |
Information Retrieval on the Blogosphere |
Global Now |
Computing and Processing |
2012 |
Open
|
208 |
Information Retrieval with Verbose Queries |
Global Now |
Computing and Processing |
2015 |
Open
|
209 |
Information Retrieval: The Early Years |
Global Now |
Computing and Processing |
2019 |
Open
|
210 |
Information Systems Success Measurement |
Global Now |
Computing and Processing |
2016 |
Open
|
211 |
Information Technology Alignment and Innovation: 30 Years of Intersecting Research |
Global Now |
Computing and Processing; General Topics for Engineers |
2021 |
Open
|
212 |
Information Technology and Entrepreneurship: Factors that Shape Investment Support for Innovation |
Global Now |
Computing and Processing |
2019 |
Open
|
213 |
Information Technology for Active Ageing: A Review of Theory and Practice |
Global Now |
Computing and Processing |
2014 |
Open
|
214 |
Innovative, Creative and Sustainable Decision-Making in Changing Contexts |
Global Now |
Computing and Processing; General Topics for Engineers |
2022 |
Open
|
552 |
Inside the World of Computing: Technologies, Uses, Challenges |
Global Wiley |
Computing and Processing |
2021 |
Open
|
553 |
Intelligent Data Analysis: From Data Gathering to Data Comprehension |
Global Wiley |
Computing and Processing |
2020 |
Open
|
554 |
Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques, and Applications |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2021 |
Open
|
555 |
Intelligent Pervasive Computing Systems for Smarter Healthcare |
Global Wiley |
Computing and Processing |
2019 |
Open
|
556 |
Intelligent Security Management and Control in the IoT |
Global Wiley |
Communication, Networking and Broadcast Technologies; Computing and Processing |
2022 |
Open
|
215 |
Interaction Design and Children |
Global Now |
Computing and Processing |
2008 |
Open
|
216 |
Interactive Information Visualization to Explore and Query Electronic Health Records |
Global Now |
Bioengineering; Computing and Processing |
2013 |
Open
|
557 |
Internet of Augmented Me, I.AM: Empowering Innovation for a New Sustainable Future |
Global Wiley |
Computing and Processing |
2020 |
Open
|
217 |
Interpersonal and Technology-based Trust Research: Gaps and Opportunities for Research and Practice |
Global Now |
Computing and Processing |
2023 |
Open
|
218 |
Introduction to Multi-Armed Bandits |
Global Now |
Computing and Processing; General Topics for Engineers |
2019 |
Open
|
558 |
Introduction to Network Security: Theory and Practice |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2015 |
Open
|
219 |
Introduction to Neural Network Verification |
Global Now |
Computing and Processing; Communication, Networking and Broadcast Technologies; Components, Circuits, Devices and Systems |
2021 |
Open
|
220 |
Introduction to Riemannian Geometry and Geometric Statistics: From Basic Theory to Implementation with Geomstats |
Global Now |
Computing and Processing; General Topics for Engineers |
2023 |
Open
|
559 |
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence |
Global Wiley |
Communication, Networking and Broadcast Technologies |
2018 |
Open
|
221 |
IT Leadership: Balancing Competing Tensions in a Rapidly Digitizing World |
Global Now |
Computing and Processing |
2024 |
Open
|
222 |
IT Project Management: Lessons Learned from Project Retrospectives 1999?2020 |
Global Now |
Computing and Processing; General Topics for Engineers |
2021 |
Open
|
223 |
IT Use and Identity: A Review and a Research Agenda |
Global Now |
Computing and Processing |
2022 |
Open
|