Cyber security for next-generation computing technologies:
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2024
|
Ausgabe: | First edition |
Schlagworte: | |
Zusammenfassung: | This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations |
Beschreibung: | xiv, 313 Seiten Illustrationen, Diagramme |
ISBN: | 9781032518992 9781032519005 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049625876 | ||
003 | DE-604 | ||
005 | 20240422 | ||
007 | t | ||
008 | 240325s2024 a||| |||| 00||| eng d | ||
020 | |a 9781032518992 |c Hbk. |9 978-1-032-51899-2 | ||
020 | |a 9781032519005 |c Pbk. |9 978-1-032-51900-5 | ||
035 | |a (OCoLC)1430766924 | ||
035 | |a (DE-599)BVBBV049625876 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Cyber security for next-generation computing technologies |c edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2024 | |
300 | |a xiv, 313 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations | |
653 | 0 | |a Artificial intelligence | |
653 | 0 | |a COM093000 | |
653 | 0 | |a COM095000 | |
653 | 0 | |a COMPUTERS / Artificial Intelligence | |
653 | 0 | |a COMPUTERS / Cryptography | |
653 | 0 | |a COMPUTERS / Data Transmission Systems / Electronic Data Interchange | |
653 | 0 | |a COMPUTERS / Information Technology | |
653 | 0 | |a COMPUTERS / Internet / Security | |
653 | 0 | |a COMPUTERS / Networking / Security | |
653 | 0 | |a COMPUTERS / Security / General | |
653 | 0 | |a COMPUTERS / Security / Viruses | |
653 | 0 | |a COMPUTERS / Social Aspects / Human-Computer Interaction | |
653 | 0 | |a Computer architecture & logic design | |
653 | 0 | |a Computer fraud & hacking | |
653 | 0 | |a Computer networking & communications | |
653 | 0 | |a Computerkriminalität, Hacking | |
653 | 0 | |a Computernetzwerke und maschinelle Kommunikation | |
653 | 0 | |a Datenschutz | |
653 | 0 | |a Dienstleistungsgewerbe, Gastgewerbe | |
653 | 0 | |a Digital- und Informationstechnologien: Rechtliche Aspekte | |
700 | 1 | |a Khan, Inam Ullah |0 (DE-588)1272976076 |4 edt | |
700 | 1 | |a Ouaissa, Mariya |0 (DE-588)1272975355 |4 edt | |
700 | 1 | |a Ouaissa, Mariyam |0 (DE-588)1259340570 |4 edt | |
700 | 1 | |a Abou El Houda, Zakaria |0 (DE-588)1326328328 |4 edt | |
700 | 1 | |a Ijaz, Muhammad Fazal |0 (DE-588)1326328921 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o 10.1201/9781003404361 |z 978-1-003-40436-1 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034969812 |
Datensatz im Suchindex
_version_ | 1813607921701879808 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Khan, Inam Ullah Ouaissa, Mariya Ouaissa, Mariyam Abou El Houda, Zakaria Ijaz, Muhammad Fazal |
author2_role | edt edt edt edt edt |
author2_variant | i u k iu iuk m o mo m o mo e h z a ehz ehza m f i mf mfi |
author_GND | (DE-588)1272976076 (DE-588)1272975355 (DE-588)1259340570 (DE-588)1326328328 (DE-588)1326328921 |
author_facet | Khan, Inam Ullah Ouaissa, Mariya Ouaissa, Mariyam Abou El Houda, Zakaria Ijaz, Muhammad Fazal |
building | Verbundindex |
bvnumber | BV049625876 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1430766924 (DE-599)BVBBV049625876 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049625876</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240422</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240325s2024 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032518992</subfield><subfield code="c">Hbk.</subfield><subfield code="9">978-1-032-51899-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032519005</subfield><subfield code="c">Pbk.</subfield><subfield code="9">978-1-032-51900-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430766924</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049625876</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security for next-generation computing technologies</subfield><subfield code="c">edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 313 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COM093000</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COM095000</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Artificial Intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Data Transmission Systems / Electronic Data Interchange</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Information Technology</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Internet / Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / Viruses</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Social Aspects / Human-Computer Interaction</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer architecture & logic design</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer fraud & hacking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networking & communications</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computerkriminalität, Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computernetzwerke und maschinelle Kommunikation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Datenschutz</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Dienstleistungsgewerbe, Gastgewerbe</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Digital- und Informationstechnologien: Rechtliche Aspekte</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Inam Ullah</subfield><subfield code="0">(DE-588)1272976076</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ouaissa, Mariya</subfield><subfield code="0">(DE-588)1272975355</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ouaissa, Mariyam</subfield><subfield code="0">(DE-588)1259340570</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abou El Houda, Zakaria</subfield><subfield code="0">(DE-588)1326328328</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ijaz, Muhammad Fazal</subfield><subfield code="0">(DE-588)1326328921</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">10.1201/9781003404361</subfield><subfield code="z">978-1-003-40436-1</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034969812</subfield></datafield></record></collection> |
id | DE-604.BV049625876 |
illustrated | Illustrated |
index_date | 2024-07-03T23:37:44Z |
indexdate | 2024-10-22T10:01:34Z |
institution | BVB |
isbn | 9781032518992 9781032519005 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034969812 |
oclc_num | 1430766924 |
open_access_boolean | |
owner | DE-188 DE-739 |
owner_facet | DE-188 DE-739 |
physical | xiv, 313 Seiten Illustrationen, Diagramme |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz First edition Boca Raton ; London ; New York CRC Press 2024 xiv, 313 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations Artificial intelligence COM093000 COM095000 COMPUTERS / Artificial Intelligence COMPUTERS / Cryptography COMPUTERS / Data Transmission Systems / Electronic Data Interchange COMPUTERS / Information Technology COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General COMPUTERS / Security / Viruses COMPUTERS / Social Aspects / Human-Computer Interaction Computer architecture & logic design Computer fraud & hacking Computer networking & communications Computerkriminalität, Hacking Computernetzwerke und maschinelle Kommunikation Datenschutz Dienstleistungsgewerbe, Gastgewerbe Digital- und Informationstechnologien: Rechtliche Aspekte Khan, Inam Ullah (DE-588)1272976076 edt Ouaissa, Mariya (DE-588)1272975355 edt Ouaissa, Mariyam (DE-588)1259340570 edt Abou El Houda, Zakaria (DE-588)1326328328 edt Ijaz, Muhammad Fazal (DE-588)1326328921 edt Erscheint auch als Online-Ausgabe 10.1201/9781003404361 978-1-003-40436-1 |
spellingShingle | Cyber security for next-generation computing technologies |
title | Cyber security for next-generation computing technologies |
title_auth | Cyber security for next-generation computing technologies |
title_exact_search | Cyber security for next-generation computing technologies |
title_exact_search_txtP | Cyber security for next-generation computing technologies |
title_full | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
title_fullStr | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
title_full_unstemmed | Cyber security for next-generation computing technologies edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz |
title_short | Cyber security for next-generation computing technologies |
title_sort | cyber security for next generation computing technologies |
work_keys_str_mv | AT khaninamullah cybersecurityfornextgenerationcomputingtechnologies AT ouaissamariya cybersecurityfornextgenerationcomputingtechnologies AT ouaissamariyam cybersecurityfornextgenerationcomputingtechnologies AT abouelhoudazakaria cybersecurityfornextgenerationcomputingtechnologies AT ijazmuhammadfazal cybersecurityfornextgenerationcomputingtechnologies |