Research anthology on artificial intelligence applications in security:
"This reference source addresses the fundamental advancements and technologies being used in AI applications for the security of digital data and information, with chapters covering a wide range of topics related to AI in security stemming from the development and design of these applications,...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[2021]
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-91 DE-706 DE-573 DE-1050 DE-1049 DE-83 Volltext |
Zusammenfassung: | "This reference source addresses the fundamental advancements and technologies being used in AI applications for the security of digital data and information, with chapters covering a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 01/16/2021) |
Beschreibung: | 1 Online-Ressource (2253 Seiten) |
ISBN: | 9781799877486 1799877485 |
DOI: | 10.4018/978-1-7998-7705-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048263268 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220609s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781799877486 |9 978-1-79987-748-6 | ||
020 | |a 1799877485 |9 1-79987-748-5 | ||
024 | 7 | |a 10.4018/978-1-7998-7705-9 |2 doi | |
035 | |a (ZDB-98-IGB)072463279 | ||
035 | |a (OCoLC)1337128781 | ||
035 | |a (DE-599)BVBBV048263268 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-706 |a DE-573 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Research anthology on artificial intelligence applications in security |c Information Resources Management Association, editor |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [2021] | |
264 | 4 | |c [2021] | |
300 | |a 1 Online-Ressource (2253 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 01/16/2021) | ||
520 | |a "This reference source addresses the fundamental advancements and technologies being used in AI applications for the security of digital data and information, with chapters covering a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way"-- | ||
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Information networks ; Security measures | |
650 | 4 | |a Computer security |x Data processing | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Information networks |x Security measures | |
650 | 4 | |a Artificial intelligence | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781799877059 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-7705-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033643466 | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-7705-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808587704175165440 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
building | Verbundindex |
bvnumber | BV048263268 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)072463279 (OCoLC)1337128781 (DE-599)BVBBV048263268 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-7998-7705-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV048263268</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220609s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799877486</subfield><subfield code="9">978-1-79987-748-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799877485</subfield><subfield code="9">1-79987-748-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-7705-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)072463279</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1337128781</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048263268</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research anthology on artificial intelligence applications in security</subfield><subfield code="c">Information Resources Management Association, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (2253 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 01/16/2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This reference source addresses the fundamental advancements and technologies being used in AI applications for the security of digital data and information, with chapters covering a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781799877059</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033643466</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-7705-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048263268 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:59:43Z |
indexdate | 2024-08-28T00:07:22Z |
institution | BVB |
isbn | 9781799877486 1799877485 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033643466 |
oclc_num | 1337128781 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-573 DE-1050 DE-1049 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-573 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (2253 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global |
record_format | marc |
spelling | Research anthology on artificial intelligence applications in security Information Resources Management Association, editor Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [2021] [2021] 1 Online-Ressource (2253 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 01/16/2021) "This reference source addresses the fundamental advancements and technologies being used in AI applications for the security of digital data and information, with chapters covering a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way"-- Artificial intelligence Computer networks ; Security measures Information networks ; Security measures Computer security Data processing Computer networks Security measures Information networks Security measures Erscheint auch als Druck-Ausgabe 9781799877059 https://doi.org/10.4018/978-1-7998-7705-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Research anthology on artificial intelligence applications in security Artificial intelligence Computer networks ; Security measures Information networks ; Security measures Computer security Data processing Computer networks Security measures Information networks Security measures |
title | Research anthology on artificial intelligence applications in security |
title_auth | Research anthology on artificial intelligence applications in security |
title_exact_search | Research anthology on artificial intelligence applications in security |
title_exact_search_txtP | Research anthology on artificial intelligence applications in security |
title_full | Research anthology on artificial intelligence applications in security Information Resources Management Association, editor |
title_fullStr | Research anthology on artificial intelligence applications in security Information Resources Management Association, editor |
title_full_unstemmed | Research anthology on artificial intelligence applications in security Information Resources Management Association, editor |
title_short | Research anthology on artificial intelligence applications in security |
title_sort | research anthology on artificial intelligence applications in security |
topic | Artificial intelligence Computer networks ; Security measures Information networks ; Security measures Computer security Data processing Computer networks Security measures Information networks Security measures |
topic_facet | Artificial intelligence Computer networks ; Security measures Information networks ; Security measures Computer security Data processing Computer networks Security measures Information networks Security measures |
url | https://doi.org/10.4018/978-1-7998-7705-9 |