Machine learning and cognitive science applications in cyber security:
"This book addresses the gap between how researchers do cyber security analysis and how an industrial security professional look at the problem of detecting threats"...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book addresses the gap between how researchers do cyber security analysis and how an industrial security professional look at the problem of detecting threats"... |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522581017 |
DOI: | 10.4018/978-1-5225-8100-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045875000 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190514s2019 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522581017 |9 978-1-5225-8101-7 | ||
035 | |a (OCoLC)1101918689 | ||
035 | |a (DE-599)BVBBV045875000 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 006.3/1 |2 23 | |
245 | 1 | 0 | |a Machine learning and cognitive science applications in cyber security |c Muhammad Salman Khan |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "This book addresses the gap between how researchers do cyber security analysis and how an industrial security professional look at the problem of detecting threats"... | ||
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer security |x Data processing | |
650 | 4 | |a Machine learning | |
650 | 4 | |a Computer crimes |x Prevention | |
700 | 1 | |a Khan, Muhammad Salman |d 1979- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, h/c |z 978-1-5225-8100-0 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-8100-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-8100-0 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8100-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8100-0 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8100-0 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8100-0 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-8100-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079018776559616 |
---|---|
adam_text | |
any_adam_object | |
author2 | Khan, Muhammad Salman 1979- |
author2_role | edt |
author2_variant | m s k ms msk |
author_facet | Khan, Muhammad Salman 1979- |
building | Verbundindex |
bvnumber | BV045875000 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1101918689 (DE-599)BVBBV045875000 |
dewey-full | 006.3/1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3/1 |
dewey-search | 006.3/1 |
dewey-sort | 16.3 11 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-8100-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV045875000</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190514s2019 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522581017</subfield><subfield code="9">978-1-5225-8101-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1101918689</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045875000</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning and cognitive science applications in cyber security</subfield><subfield code="c">Muhammad Salman Khan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book addresses the gap between how researchers do cyber security analysis and how an industrial security professional look at the problem of detecting threats"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Muhammad Salman</subfield><subfield code="d">1979-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, h/c</subfield><subfield code="z">978-1-5225-8100-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-8100-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045875000 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:19Z |
institution | BVB |
isbn | 9781522581017 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031258233 |
oclc_num | 1101918689 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Machine learning and cognitive science applications in cyber security Muhammad Salman Khan Hershey, PA IGI Global [2019] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "This book addresses the gap between how researchers do cyber security analysis and how an industrial security professional look at the problem of detecting threats"... Internet Security measures Computer security Data processing Machine learning Computer crimes Prevention Khan, Muhammad Salman 1979- edt Erscheint auch als Druck-Ausgabe, h/c 978-1-5225-8100-0 https://doi.org/10.4018/978-1-5225-8100-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Machine learning and cognitive science applications in cyber security Internet Security measures Computer security Data processing Machine learning Computer crimes Prevention |
title | Machine learning and cognitive science applications in cyber security |
title_auth | Machine learning and cognitive science applications in cyber security |
title_exact_search | Machine learning and cognitive science applications in cyber security |
title_full | Machine learning and cognitive science applications in cyber security Muhammad Salman Khan |
title_fullStr | Machine learning and cognitive science applications in cyber security Muhammad Salman Khan |
title_full_unstemmed | Machine learning and cognitive science applications in cyber security Muhammad Salman Khan |
title_short | Machine learning and cognitive science applications in cyber security |
title_sort | machine learning and cognitive science applications in cyber security |
topic | Internet Security measures Computer security Data processing Machine learning Computer crimes Prevention |
topic_facet | Internet Security measures Computer security Data processing Machine learning Computer crimes Prevention |
url | https://doi.org/10.4018/978-1-5225-8100-0 |
work_keys_str_mv | AT khanmuhammadsalman machinelearningandcognitivescienceapplicationsincybersecurity |