Cyber defense mechanisms (Record no. 69812)

000 -LEADER
fixed length control field 02804cam a2200553Ki 4500
001 - CONTROL NUMBER
control field 9780367816438
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711211903.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200725s2021 flu ob 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000171983
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000171981
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000171921
-- (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000171922
-- (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780367816438
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0367816431
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000171952
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000171957
-- (electronic bk. : Mobipocket)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 00 - TITLE STATEMENT
Title Cyber defense mechanisms
Sub Title security, privacy, and challenges /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton, FL :
Publisher CRC Press,
Year of publication 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource.
490 1# - SERIES STATEMENT
Series statement Artificial intelligence (AI). Elementary to advanced practices
520 ## - SUMMARY, ETC.
Summary, etc This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Kumar, Gautam,
700 1# - AUTHOR 2
Author 2 Saini, Dinesh Kumar,
700 1# - AUTHOR 2
Author 2 Cuong, Nguyen Ha Huy.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9780367816438
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / General
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Cryptography
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Computer Science

No items available.