Detecting and mitigating robotic cyber security risks:
"[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this bo...
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044955092 | ||
003 | DE-604 | ||
005 | 20190801 | ||
007 | cr|uuu---uuuuu | ||
008 | 180522s2017 xx a||| o|||| 00||| eng d | ||
020 | |a 9781522521556 |9 978-1-5225-2155-6 | ||
024 | 7 | |a 10.4018/978-1-5225-2154-9 |2 doi | |
035 | |a (ZDB-1-IGE)00172432 | ||
035 | |a (OCoLC)1002921628 | ||
035 | |a (DE-599)BVBBV044955092 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-1050 |a DE-706 |a DE-20 |a DE-1049 |a DE-898 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 308 |0 (DE-625)143655: |2 rvk | ||
245 | 1 | 0 | |a Detecting and mitigating robotic cyber security risks |c Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 Online-Ressource (xxx, 384 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
520 | |a "[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts" - Provided by publisher | ||
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Mobile computing / Security measures | |
650 | 4 | |a Robots / Control systems / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Roboter |0 (DE-588)4050208-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Roboter |0 (DE-588)4050208-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kumar, Raghvendra |d 1987- |0 (DE-588)1156490286 |4 edt | |
700 | 1 | |a Pattnaik, Prasant Kumar |d 1969- |0 (DE-588)1184593337 |4 edt | |
700 | 1 | |a Pandey, Priyanka |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5225-2154-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-2154-2 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE | ||
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030347780 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2328256 |
---|---|
_version_ | 1821935841213153280 |
any_adam_object | |
author2 | Kumar, Raghvendra 1987- Pattnaik, Prasant Kumar 1969- Pandey, Priyanka |
author2_role | edt edt edt |
author2_variant | r k rk p k p pk pkp p p pp |
author_GND | (DE-588)1156490286 (DE-588)1184593337 |
author_facet | Kumar, Raghvendra 1987- Pattnaik, Prasant Kumar 1969- Pandey, Priyanka |
building | Verbundindex |
bvnumber | BV044955092 |
classification_rvk | ST 308 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00172432 (OCoLC)1002921628 (DE-599)BVBBV044955092 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03846nam a2200625 c 4500</leader><controlfield tag="001">BV044955092</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190801 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180522s2017 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522521556</subfield><subfield code="9">978-1-5225-2155-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-2154-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00172432</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002921628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044955092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 308</subfield><subfield code="0">(DE-625)143655:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detecting and mitigating robotic cyber security risks</subfield><subfield code="c">Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 384 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"[This book] is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Robots / Control systems / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Roboter</subfield><subfield code="0">(DE-588)4050208-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Roboter</subfield><subfield code="0">(DE-588)4050208-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Raghvendra</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1156490286</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pattnaik, Prasant Kumar</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)1184593337</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Priyanka</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-2154-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-2154-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030347780</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044955092 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:15:12Z |
institution | BVB |
isbn | 9781522521556 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030347780 |
oclc_num | 1002921628 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-1050 DE-706 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-1050 DE-706 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxx, 384 Seiten) Illustrationen, Diagramme |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spellingShingle | Detecting and mitigating robotic cyber security risks Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit (DE-588)4274324-2 gnd Roboter (DE-588)4050208-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4050208-9 |
title | Detecting and mitigating robotic cyber security risks |
title_auth | Detecting and mitigating robotic cyber security risks |
title_exact_search | Detecting and mitigating robotic cyber security risks |
title_full | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
title_fullStr | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
title_full_unstemmed | Detecting and mitigating robotic cyber security risks Raghavendra Kumar (LNCT Group of College, India), Prasant Kumar Pattnaik (KIIT University, India), Priyanka Pandey (LNCT Group of College, India) |
title_short | Detecting and mitigating robotic cyber security risks |
title_sort | detecting and mitigating robotic cyber security risks |
topic | Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit (DE-588)4274324-2 gnd Roboter (DE-588)4050208-9 gnd |
topic_facet | Cloud computing / Security measures Mobile computing / Security measures Robots / Control systems / Security measures Computersicherheit Roboter |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2154-9 |
work_keys_str_mv | AT kumarraghvendra detectingandmitigatingroboticcybersecurityrisks AT pattnaikprasantkumar detectingandmitigatingroboticcybersecurityrisks AT pandeypriyanka detectingandmitigatingroboticcybersecurityrisks |