Information Systems: A Manager's Guide to Harnessing Technology
Adversarial Attacks On ML Systems
Is Feature Selection Secure against Training Data Poisoning?
Test Prep for AP® Courses
Computer Systems Security
Computer Systems Security
Chapter Review
Introduction to EECS II: Digital Communication Systems
Computer Systems Security
Crowdsourcing/non-market strategies