Risk detection and cyber security for the success of contemporary computing:
Risk Detection and Cyber Security for the Success of Contemporary Computing presents the newest findings with technological advances that can be utilized for more effective prevention techniques to protect against cyber threats. This book is led by editors of best-selling and highly indexed publicat...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
[2024]
|
Schlagwörter: | |
Links: | https://doi.org/10.4018/978-1-6684-9317-5 https://doi.org/10.4018/978-1-6684-9317-5 https://doi.org/10.4018/978-1-6684-9317-5 https://doi.org/10.4018/978-1-6684-9317-5 |
Zusammenfassung: | Risk Detection and Cyber Security for the Success of Contemporary Computing presents the newest findings with technological advances that can be utilized for more effective prevention techniques to protect against cyber threats. This book is led by editors of best-selling and highly indexed publications, and together they have over two decades of experience in computer science and engineering. Featuring extensive coverage on authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementation of optimized security in digital contexts. |
Umfang: | 1 Online-Ressource (480 Seiten) |
ISBN: | 9781668493199 |
DOI: | 10.4018/978-1-6684-9317-5 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049458548 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 231208s2024 xx o|||| 00||| eng d | ||
020 | |a 9781668493199 |9 978-1-66849-319-9 | ||
024 | 7 | |a 10.4018/978-1-6684-9317-5 |2 doi | |
035 | |a (ZDB-98-IGB)00318680 | ||
035 | |a (OCoLC)1414551570 | ||
035 | |a (DE-599)BVBBV049458548 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Risk detection and cyber security for the success of contemporary computing |c edited Raghvendra Kumar, and Prasant Kumar Pattnaik |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c [2024] | |
300 | |a 1 Online-Ressource (480 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Risk Detection and Cyber Security for the Success of Contemporary Computing presents the newest findings with technological advances that can be utilized for more effective prevention techniques to protect against cyber threats. This book is led by editors of best-selling and highly indexed publications, and together they have over two decades of experience in computer science and engineering. Featuring extensive coverage on authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementation of optimized security in digital contexts. | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Robotics |x Security measures | |
650 | 4 | |a Intrusion detection systems (Computer security) | |
700 | 1 | |a Kumar, Raghvendra |d 1987- |4 edt | |
700 | 1 | |a Pattnaik, Prasant Kumar |d 1969- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668493175 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668493182 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668493179 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-9317-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034804313 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-9317-5 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-9317-5 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-9317-5 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2772820 |
---|---|
_version_ | 1821936740669063168 |
adam_text | |
any_adam_object | |
author2 | Kumar, Raghvendra 1987- Pattnaik, Prasant Kumar 1969- |
author2_role | edt edt |
author2_variant | r k rk p k p pk pkp |
author_facet | Kumar, Raghvendra 1987- Pattnaik, Prasant Kumar 1969- |
building | Verbundindex |
bvnumber | BV049458548 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00318680 (OCoLC)1414551570 (DE-599)BVBBV049458548 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-9317-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049458548</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231208s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668493199</subfield><subfield code="9">978-1-66849-319-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-9317-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00318680</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1414551570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049458548</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk detection and cyber security for the success of contemporary computing</subfield><subfield code="c">edited Raghvendra Kumar, and Prasant Kumar Pattnaik</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (480 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Risk Detection and Cyber Security for the Success of Contemporary Computing presents the newest findings with technological advances that can be utilized for more effective prevention techniques to protect against cyber threats. This book is led by editors of best-selling and highly indexed publications, and together they have over two decades of experience in computer science and engineering. Featuring extensive coverage on authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementation of optimized security in digital contexts.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Robotics</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intrusion detection systems (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Raghvendra</subfield><subfield code="d">1987-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pattnaik, Prasant Kumar</subfield><subfield code="d">1969-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668493175</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668493182</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668493179</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-9317-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034804313</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-9317-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-9317-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-9317-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049458548 |
illustrated | Not Illustrated |
indexdate | 2025-01-11T15:38:12Z |
institution | BVB |
isbn | 9781668493199 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034804313 |
oclc_num | 1414551570 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (480 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2023 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spellingShingle | Risk detection and cyber security for the success of contemporary computing Computer security Robotics Security measures Intrusion detection systems (Computer security) |
title | Risk detection and cyber security for the success of contemporary computing |
title_auth | Risk detection and cyber security for the success of contemporary computing |
title_exact_search | Risk detection and cyber security for the success of contemporary computing |
title_full | Risk detection and cyber security for the success of contemporary computing edited Raghvendra Kumar, and Prasant Kumar Pattnaik |
title_fullStr | Risk detection and cyber security for the success of contemporary computing edited Raghvendra Kumar, and Prasant Kumar Pattnaik |
title_full_unstemmed | Risk detection and cyber security for the success of contemporary computing edited Raghvendra Kumar, and Prasant Kumar Pattnaik |
title_short | Risk detection and cyber security for the success of contemporary computing |
title_sort | risk detection and cyber security for the success of contemporary computing |
topic | Computer security Robotics Security measures Intrusion detection systems (Computer security) |
topic_facet | Computer security Robotics Security measures Intrusion detection systems (Computer security) |
url | https://doi.org/10.4018/978-1-6684-9317-5 |
work_keys_str_mv | AT kumarraghvendra riskdetectionandcybersecurityforthesuccessofcontemporarycomputing AT pattnaikprasantkumar riskdetectionandcybersecurityforthesuccessofcontemporarycomputing |