Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Incorporated
2023
|
Schlagworte: | |
Online-Zugang: | FHI01 TUM01 UBY01 Volltext |
Beschreibung: | 1 Online-Ressource (xxiii, 260 Seiten) Illustrationen, Diagramme |
ISBN: | 9781119898887 9781119898894 9781119898900 |
DOI: | 10.1002/9781119898900 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049432808 | ||
003 | DE-604 | ||
005 | 20240207 | ||
007 | cr|uuu---uuuuu | ||
008 | 231127s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781119898887 |9 978-1-119-89888-7 | ||
020 | |a 9781119898894 |9 9781119898894 | ||
020 | |a 9781119898900 |9 9781119898900 | ||
024 | 7 | |a 10.1002/9781119898900 |2 doi | |
035 | |a (ZDB-30-PQE)EBC7251056 | ||
035 | |a (ZDB-30-PAD)EBC7251056 | ||
035 | |a (ZDB-89-EBL)EBL7251056 | ||
035 | |a (ZDB-35-WIC)9781119898900 | ||
035 | |a (OCoLC)1380464626 | ||
035 | |a (DE-599)BVBBV049432808 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-706 | ||
082 | 0 | |a 5.88 | |
100 | 1 | |a Tari, Zahir |d 1961- |e Verfasser |0 (DE-588)1197562176 |4 aut | |
245 | 1 | 0 | |a Data Exfiltration Threats and Prevention Techniques |b Machine Learning and Memory-Based Data Security |c Zahir Tari (RMIT University Melbourne, Australia), Nasrin Sohrabi (RMIT University Melbourne, Australia), Yasaman Samadi (RMIT University Melbourne, Australia), Jakapan Suaboot (Prince of Songkla University Phuket, Thailand) |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Incorporated |c 2023 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource (xxiii, 260 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer security-Computer programs | |
700 | 1 | |a Sohrabi, Nasrin |e Sonstige |4 oth | |
700 | 1 | |a Samadi, Yasaman |e Sonstige |4 oth | |
700 | 1 | |a Suaboot, Jakapan |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Tari, Zahir |t Data Exfiltration Threats and Prevention Techniques |d Newark : John Wiley & Sons, Incorporated,c2023 |z 9781119898870 |
856 | 4 | 0 | |u https://doi.org/10.1002/9781119898900 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE |a ZDB-35-WEL |a ZDB-35-WIC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034778894 | ||
966 | e | |u https://ieeexplore.ieee.org/book/10138092 |l FHI01 |p ZDB-35-WEL |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=7251056 |l TUM01 |p ZDB-30-PQE |q TUM_PDA_PQE |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781119898900 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186176415858688 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Tari, Zahir 1961- |
author_GND | (DE-588)1197562176 |
author_facet | Tari, Zahir 1961- |
author_role | aut |
author_sort | Tari, Zahir 1961- |
author_variant | z t zt |
building | Verbundindex |
bvnumber | BV049432808 |
collection | ZDB-30-PQE ZDB-35-WEL ZDB-35-WIC |
ctrlnum | (ZDB-30-PQE)EBC7251056 (ZDB-30-PAD)EBC7251056 (ZDB-89-EBL)EBL7251056 (ZDB-35-WIC)9781119898900 (OCoLC)1380464626 (DE-599)BVBBV049432808 |
dewey-full | 5.88 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 5.88 |
dewey-search | 5.88 |
dewey-sort | 15.88 |
dewey-tens | 000 - Computer science, information, general works |
doi_str_mv | 10.1002/9781119898900 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02313nmm a2200481zc 4500</leader><controlfield tag="001">BV049432808</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240207 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231127s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119898887</subfield><subfield code="9">978-1-119-89888-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119898894</subfield><subfield code="9">9781119898894</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119898900</subfield><subfield code="9">9781119898900</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119898900</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7251056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7251056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7251056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)9781119898900</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1380464626</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049432808</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">5.88</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tari, Zahir</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1197562176</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data Exfiltration Threats and Prevention Techniques</subfield><subfield code="b">Machine Learning and Memory-Based Data Security</subfield><subfield code="c">Zahir Tari (RMIT University Melbourne, Australia), Nasrin Sohrabi (RMIT University Melbourne, Australia), Yasaman Samadi (RMIT University Melbourne, Australia), Jakapan Suaboot (Prince of Songkla University Phuket, Thailand)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 260 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security-Computer programs</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sohrabi, Nasrin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samadi, Yasaman</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suaboot, Jakapan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Tari, Zahir</subfield><subfield code="t">Data Exfiltration Threats and Prevention Techniques</subfield><subfield code="d">Newark : John Wiley & Sons, Incorporated,c2023</subfield><subfield code="z">9781119898870</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781119898900</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-35-WEL</subfield><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034778894</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/book/10138092</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=7251056</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119898900</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049432808 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:10:36Z |
indexdate | 2024-07-10T10:06:58Z |
institution | BVB |
isbn | 9781119898887 9781119898894 9781119898900 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034778894 |
oclc_num | 1380464626 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-706 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-706 |
physical | 1 Online-Ressource (xxiii, 260 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-35-WEL ZDB-35-WIC ZDB-30-PQE TUM_PDA_PQE ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
spelling | Tari, Zahir 1961- Verfasser (DE-588)1197562176 aut Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security Zahir Tari (RMIT University Melbourne, Australia), Nasrin Sohrabi (RMIT University Melbourne, Australia), Yasaman Samadi (RMIT University Melbourne, Australia), Jakapan Suaboot (Prince of Songkla University Phuket, Thailand) Hoboken, NJ John Wiley & Sons, Incorporated 2023 ©2023 1 Online-Ressource (xxiii, 260 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Computer security-Computer programs Sohrabi, Nasrin Sonstige oth Samadi, Yasaman Sonstige oth Suaboot, Jakapan Sonstige oth Erscheint auch als Druck-Ausgabe Tari, Zahir Data Exfiltration Threats and Prevention Techniques Newark : John Wiley & Sons, Incorporated,c2023 9781119898870 https://doi.org/10.1002/9781119898900 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Tari, Zahir 1961- Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security Computer security-Computer programs |
title | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security |
title_auth | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security |
title_exact_search | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security |
title_exact_search_txtP | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security |
title_full | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security Zahir Tari (RMIT University Melbourne, Australia), Nasrin Sohrabi (RMIT University Melbourne, Australia), Yasaman Samadi (RMIT University Melbourne, Australia), Jakapan Suaboot (Prince of Songkla University Phuket, Thailand) |
title_fullStr | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security Zahir Tari (RMIT University Melbourne, Australia), Nasrin Sohrabi (RMIT University Melbourne, Australia), Yasaman Samadi (RMIT University Melbourne, Australia), Jakapan Suaboot (Prince of Songkla University Phuket, Thailand) |
title_full_unstemmed | Data Exfiltration Threats and Prevention Techniques Machine Learning and Memory-Based Data Security Zahir Tari (RMIT University Melbourne, Australia), Nasrin Sohrabi (RMIT University Melbourne, Australia), Yasaman Samadi (RMIT University Melbourne, Australia), Jakapan Suaboot (Prince of Songkla University Phuket, Thailand) |
title_short | Data Exfiltration Threats and Prevention Techniques |
title_sort | data exfiltration threats and prevention techniques machine learning and memory based data security |
title_sub | Machine Learning and Memory-Based Data Security |
topic | Computer security-Computer programs |
topic_facet | Computer security-Computer programs |
url | https://doi.org/10.1002/9781119898900 |
work_keys_str_mv | AT tarizahir dataexfiltrationthreatsandpreventiontechniquesmachinelearningandmemorybaseddatasecurity AT sohrabinasrin dataexfiltrationthreatsandpreventiontechniquesmachinelearningandmemorybaseddatasecurity AT samadiyasaman dataexfiltrationthreatsandpreventiontechniquesmachinelearningandmemorybaseddatasecurity AT suabootjakapan dataexfiltrationthreatsandpreventiontechniquesmachinelearningandmemorybaseddatasecurity |