Handbook of research on cyber security intelligence and analytics:
"This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age.
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2022
|
Schlagworte: | |
Online-Zugang: | DE-83 DE-91 DE-706 DE-898 DE-1050 Volltext |
Zusammenfassung: | "This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age. |
Beschreibung: | Includes bibliographical references and index. - Mode of access: World Wide Web |
Beschreibung: | 1 Online-Ressource (269 Seiten) |
ISBN: | 9781668439937 |
DOI: | 10.4018/978-1-6684-3991-3 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048447375 | ||
003 | DE-604 | ||
005 | 20230208 | ||
007 | cr|uuu---uuuuu | ||
008 | 220830s2022 xx o|||| 00||| eng d | ||
020 | |a 9781668439937 |9 978-1-66843-993-7 | ||
024 | 7 | |a 10.4018/978-1-6684-3991-3 |2 doi | |
035 | |a (ZDB-98-IGB)00286806 | ||
035 | |a (OCoLC)1344239174 | ||
035 | |a (DE-599)BVBBV048447375 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-83 |a DE-706 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Handbook of research on cyber security intelligence and analytics |c Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar, editors |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2022 | |
300 | |a 1 Online-Ressource (269 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Mode of access: World Wide Web | ||
520 | |a "This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age. | ||
650 | 4 | |a Computer networks |x Security measures |x Data processing | |
650 | 4 | |a Artificial intelligence | |
700 | 1 | |a Kumar, S P. Pavan |4 edt | |
700 | 1 | |a Pooja, M. R. |4 edt | |
700 | 1 | |a Gururaj, H. L. |4 edt | |
700 | 1 | |a Jena, Om Prakash |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668439913 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668439913 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668439913 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-3991-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033825590 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3991-3 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3991-3 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2022 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3991-3 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3991-3 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3991-3 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715326481694720 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Kumar, S P. Pavan Pooja, M. R. Gururaj, H. L. Jena, Om Prakash |
author2_role | edt edt edt edt |
author2_variant | s p p k spp sppk m r p mr mrp h l g hl hlg o p j op opj |
author_facet | Kumar, S P. Pavan Pooja, M. R. Gururaj, H. L. Jena, Om Prakash |
building | Verbundindex |
bvnumber | BV048447375 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00286806 (OCoLC)1344239174 (DE-599)BVBBV048447375 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-3991-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV048447375</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230208</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220830s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668439937</subfield><subfield code="9">978-1-66843-993-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-3991-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00286806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1344239174</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048447375</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of research on cyber security intelligence and analytics</subfield><subfield code="c">Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (269 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Mode of access: World Wide Web</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, S P. Pavan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pooja, M. R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gururaj, H. L.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jena, Om Prakash</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668439913</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668439913</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668439913</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-3991-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033825590</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3991-3</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3991-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3991-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3991-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3991-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048447375 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:29:38Z |
indexdate | 2024-12-17T19:01:35Z |
institution | BVB |
isbn | 9781668439937 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033825590 |
oclc_num | 1344239174 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-83 DE-706 DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-83 DE-706 DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (269 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB TUM_Paketkauf_2022 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global |
record_format | marc |
spelling | Handbook of research on cyber security intelligence and analytics Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar, editors Hershey, Pennsylvania IGI Global 2022 1 Online-Ressource (269 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Mode of access: World Wide Web "This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age. Computer networks Security measures Data processing Artificial intelligence Kumar, S P. Pavan edt Pooja, M. R. edt Gururaj, H. L. edt Jena, Om Prakash edt Erscheint auch als Druck-Ausgabe 9781668439913 Erscheint auch als Druck-Ausgabe 1668439913 https://doi.org/10.4018/978-1-6684-3991-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Handbook of research on cyber security intelligence and analytics Computer networks Security measures Data processing Artificial intelligence |
title | Handbook of research on cyber security intelligence and analytics |
title_auth | Handbook of research on cyber security intelligence and analytics |
title_exact_search | Handbook of research on cyber security intelligence and analytics |
title_exact_search_txtP | Handbook of research on cyber security intelligence and analytics |
title_full | Handbook of research on cyber security intelligence and analytics Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar, editors |
title_fullStr | Handbook of research on cyber security intelligence and analytics Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar, editors |
title_full_unstemmed | Handbook of research on cyber security intelligence and analytics Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar, editors |
title_short | Handbook of research on cyber security intelligence and analytics |
title_sort | handbook of research on cyber security intelligence and analytics |
topic | Computer networks Security measures Data processing Artificial intelligence |
topic_facet | Computer networks Security measures Data processing Artificial intelligence |
url | https://doi.org/10.4018/978-1-6684-3991-3 |
work_keys_str_mv | AT kumarsppavan handbookofresearchoncybersecurityintelligenceandanalytics AT poojamr handbookofresearchoncybersecurityintelligenceandanalytics AT gururajhl handbookofresearchoncybersecurityintelligenceandanalytics AT jenaomprakash handbookofresearchoncybersecurityintelligenceandanalytics |