Detecting and mitigating robotic cyber security risks:
"[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this bo...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2017]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-91 DE-706 DE-20 DE-1049 DE-898 DE-83 Volltext |
Zusammenfassung: | "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts" - Provided by publisher |
Beschreibung: | 1 Online-Ressource (xxx, 384 Seiten) Illustrationen, Diagramme |
ISBN: | 9781522521556 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044955092 | ||
003 | DE-604 | ||
005 | 20190801 | ||
007 | cr|uuu---uuuuu | ||
008 | 180522s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781522521556 |9 978-1-5225-2155-6 | ||
024 | 7 | |a 10.4018/978-1-5225-2154-9 |2 doi | |
035 | |a (ZDB-1-IGE)00172432 | ||
035 | |a (OCoLC)1002921628 | ||
035 | |a (DE-599)BVBBV044955092 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-1050 |a DE-706 |a DE-20 |a DE-1049 |a DE-898 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 308 |0 (DE-625)143655: |2 rvk | ||
245 | 1 | 0 | |a Detecting and mitigating robotic cyber security risks |c Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 Online-Ressource (xxx, 384 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
520 | |a "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts" - Provided by publisher | ||
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Mobile computing / Security measures | |
650 | 4 | |a Robots / Control systems / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Roboter |0 (DE-588)4050208-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Roboter |0 (DE-588)4050208-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kumar, Raghvendra |d 1987- |0 (DE-588)1156490286 |4 edt | |
700 | 1 | |a Pattnaik, Prasant Kumar |d 1969- |0 (DE-588)1184593337 |4 edt | |
700 | 1 | |a Pandey, Priyanka |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5225-2154-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-2154-2 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079016732884992 |
---|---|
adam_text | |
any_adam_object | |
author2 | Kumar, Raghvendra 1987- Pattnaik, Prasant Kumar 1969- Pandey, Priyanka |
author2_role | edt edt edt |
author2_variant | r k rk p k p pk pkp p p pp |
author_GND | (DE-588)1156490286 (DE-588)1184593337 |
author_facet | Kumar, Raghvendra 1987- Pattnaik, Prasant Kumar 1969- Pandey, Priyanka |
building | Verbundindex |
bvnumber | BV044955092 |
classification_rvk | ST 308 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00172432 (OCoLC)1002921628 (DE-599)BVBBV044955092 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044955092</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190801</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180522s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522521556</subfield><subfield code="9">978-1-5225-2155-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-2154-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00172432</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002921628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044955092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 308</subfield><subfield code="0">(DE-625)143655:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detecting and mitigating robotic cyber security risks</subfield><subfield code="c">Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 384 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Robots / Control systems / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Roboter</subfield><subfield code="0">(DE-588)4050208-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Roboter</subfield><subfield code="0">(DE-588)4050208-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Raghvendra</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1156490286</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pattnaik, Prasant Kumar</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)1184593337</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Priyanka</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-2154-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-2154-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044955092 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:17Z |
institution | BVB |
isbn | 9781522521556 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030347780 |
oclc_num | 1002921628 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-1050 DE-706 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-1050 DE-706 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxx, 384 Seiten) Illustrationen, Diagramme |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) Hershey PA, USA IGI Global, Disseminator of Knowledge [2017] © 2017 1 Online-Ressource (xxx, 384 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts" - Provided by publisher Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Roboter (DE-588)4050208-9 gnd rswk-swf Roboter (DE-588)4050208-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Kumar, Raghvendra 1987- (DE-588)1156490286 edt Pattnaik, Prasant Kumar 1969- (DE-588)1184593337 edt Pandey, Priyanka edt Erscheint auch als Druck-Ausgabe 978-1-5225-2154-9 Erscheint auch als Druck-Ausgabe 1-5225-2154-2 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Detecting and mitigating robotic cyber security risks Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit (DE-588)4274324-2 gnd Roboter (DE-588)4050208-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4050208-9 |
title | Detecting and mitigating robotic cyber security risks |
title_auth | Detecting and mitigating robotic cyber security risks |
title_exact_search | Detecting and mitigating robotic cyber security risks |
title_full | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
title_fullStr | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
title_full_unstemmed | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
title_short | Detecting and mitigating robotic cyber security risks |
title_sort | detecting and mitigating robotic cyber security risks |
topic | Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit (DE-588)4274324-2 gnd Roboter (DE-588)4050208-9 gnd |
topic_facet | Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit Roboter |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |
work_keys_str_mv | AT kumarraghvendra detectingandmitigatingroboticcybersecurityrisks AT pattnaikprasantkumar detectingandmitigatingroboticcybersecurityrisks AT pandeypriyanka detectingandmitigatingroboticcybersecurityrisks |