Nature-inspired cyber security and resiliency: fundamentals, techniques and applications
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London, United Kingdom
<<The>> Institution of Engineering and Technology
2019
|
Schriftenreihe: | IET security series
10 |
Schlagworte: | |
Online-Zugang: | FWS01 FWS02 UBT01 UBY01 UER01 Volltext |
Beschreibung: | 1 Online-Ressource (480 Seiten) Illustrationen |
ISBN: | 9781785616396 |
DOI: | 10.1049/PBSE010E |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV046356585 | ||
003 | DE-604 | ||
005 | 20210723 | ||
007 | cr|uuu---uuuuu | ||
008 | 200127s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781785616396 |c Online |9 978-1-78561-639-6 | ||
024 | 7 | |a 10.1049/PBSE010E |2 doi | |
035 | |a (OCoLC)1137842015 | ||
035 | |a (DE-599)BVBBV046356585 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29 |a DE-863 |a DE-862 |a DE-703 |a DE-706 | ||
245 | 1 | 0 | |a Nature-inspired cyber security and resiliency |b fundamentals, techniques and applications |c edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, and Wojciech Mazurczyk |
264 | 1 | |a London, United Kingdom |b <<The>> Institution of Engineering and Technology |c 2019 | |
300 | |a 1 Online-Ressource (480 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IET security series |v 10 | |
650 | 4 | |a Biomimetics | |
650 | 4 | |a Computer security | |
650 | 7 | |a Biomimetics |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a biomimetics |2 inspect | |
650 | 7 | |a fault tolerant computing |2 inspect | |
650 | 7 | |a security of data |2 inspect | |
650 | 7 | |a trusted computing |2 inspect | |
700 | 1 | |a El-Alfy, El-Sayed M. |d 1968- |0 (DE-588)1062512413 |4 edt | |
700 | 1 | |a Eltoweissy, Mohamed |4 edt | |
700 | 1 | |a Fulp, Errin W. |4 edt | |
700 | 1 | |a Mazurczyk, Wojciech |0 (DE-588)1097599752 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-78561-638-9 |
830 | 0 | |a IET security series |v 10 |w (DE-604)BV047143178 |9 10 | |
856 | 4 | 0 | |u https://doi.org/10.1049/PBSE010E |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-100-IET | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031732959 | ||
966 | e | |u https://doi.org/10.1049/PBSE010E |l FWS01 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE010E |l FWS02 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE010E |l UBT01 |p ZDB-100-IET |q UBT_PDA_IET_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE010E |l UBY01 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE010E |l UER01 |p ZDB-100-IET |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 847853 |
---|---|
_version_ | 1806192155672182784 |
any_adam_object | |
author2 | El-Alfy, El-Sayed M. 1968- Eltoweissy, Mohamed Fulp, Errin W. Mazurczyk, Wojciech |
author2_role | edt edt edt edt |
author2_variant | e s m e a esme esmea m e me e w f ew ewf w m wm |
author_GND | (DE-588)1062512413 (DE-588)1097599752 |
author_facet | El-Alfy, El-Sayed M. 1968- Eltoweissy, Mohamed Fulp, Errin W. Mazurczyk, Wojciech |
building | Verbundindex |
bvnumber | BV046356585 |
collection | ZDB-100-IET |
ctrlnum | (OCoLC)1137842015 (DE-599)BVBBV046356585 |
doi_str_mv | 10.1049/PBSE010E |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02220nmm a2200517 cb4500</leader><controlfield tag="001">BV046356585</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210723 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200127s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785616396</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78561-639-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1049/PBSE010E</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1137842015</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046356585</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nature-inspired cyber security and resiliency</subfield><subfield code="b">fundamentals, techniques and applications</subfield><subfield code="c">edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, and Wojciech Mazurczyk</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London, United Kingdom</subfield><subfield code="b"><<The>> Institution of Engineering and Technology</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (480 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IET security series</subfield><subfield code="v">10</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biomimetics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Biomimetics</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">biomimetics</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">fault tolerant computing</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">security of data</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">trusted computing</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">El-Alfy, El-Sayed M.</subfield><subfield code="d">1968-</subfield><subfield code="0">(DE-588)1062512413</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eltoweissy, Mohamed</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fulp, Errin W.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mazurczyk, Wojciech</subfield><subfield code="0">(DE-588)1097599752</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-78561-638-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IET security series</subfield><subfield code="v">10</subfield><subfield code="w">(DE-604)BV047143178</subfield><subfield code="9">10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1049/PBSE010E</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-100-IET</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031732959</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE010E</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE010E</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE010E</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="q">UBT_PDA_IET_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE010E</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE010E</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046356585 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T15:31:09Z |
institution | BVB |
isbn | 9781785616396 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031732959 |
oclc_num | 1137842015 |
open_access_boolean | |
owner | DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-703 DE-706 |
owner_facet | DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-703 DE-706 |
physical | 1 Online-Ressource (480 Seiten) Illustrationen |
psigel | ZDB-100-IET ZDB-100-IET UBT_PDA_IET_Kauf |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | <<The>> Institution of Engineering and Technology |
record_format | marc |
series | IET security series |
series2 | IET security series |
spellingShingle | Nature-inspired cyber security and resiliency fundamentals, techniques and applications IET security series Biomimetics Computer security Biomimetics fast Computer security fast biomimetics inspect fault tolerant computing inspect security of data inspect trusted computing inspect |
title | Nature-inspired cyber security and resiliency fundamentals, techniques and applications |
title_auth | Nature-inspired cyber security and resiliency fundamentals, techniques and applications |
title_exact_search | Nature-inspired cyber security and resiliency fundamentals, techniques and applications |
title_full | Nature-inspired cyber security and resiliency fundamentals, techniques and applications edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, and Wojciech Mazurczyk |
title_fullStr | Nature-inspired cyber security and resiliency fundamentals, techniques and applications edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, and Wojciech Mazurczyk |
title_full_unstemmed | Nature-inspired cyber security and resiliency fundamentals, techniques and applications edited by El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, and Wojciech Mazurczyk |
title_short | Nature-inspired cyber security and resiliency |
title_sort | nature inspired cyber security and resiliency fundamentals techniques and applications |
title_sub | fundamentals, techniques and applications |
topic | Biomimetics Computer security Biomimetics fast Computer security fast biomimetics inspect fault tolerant computing inspect security of data inspect trusted computing inspect |
topic_facet | Biomimetics Computer security biomimetics fault tolerant computing security of data trusted computing |
url | https://doi.org/10.1049/PBSE010E |
volume_link | (DE-604)BV047143178 |
work_keys_str_mv | AT elalfyelsayedm natureinspiredcybersecurityandresiliencyfundamentalstechniquesandapplications AT eltoweissymohamed natureinspiredcybersecurityandresiliencyfundamentalstechniquesandapplications AT fulperrinw natureinspiredcybersecurityandresiliencyfundamentalstechniquesandapplications AT mazurczykwojciech natureinspiredcybersecurityandresiliencyfundamentalstechniquesandapplications |