000 | 03301nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-10-8536-9 | ||
003 | DE-He213 | ||
005 | 20210201191424.0 | ||
007 | cr nn 008mamaa | ||
008 | 180427s2018 si | s |||| 0|eng d | ||
020 |
_a9789811085369 _9978-981-10-8536-9 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Security _h[electronic resource] : _bProceedings of CSI 2015 / _cedited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aSingapore : _bSpringer Singapore : _bImprint: Springer, _c2018. |
|
300 |
_aXXIII, 505 p. 191 illus., 117 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Intelligent Systems and Computing, _x2194-5357 ; _v729 |
|
500 | _aAcceso multiusuario | ||
520 | _aThis book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike. | ||
541 |
_fUABC ; _cTemporal ; _d01/01/2021-12/31/2023. |
||
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer crimes. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aCybercrime. _0https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 |
650 | 2 | 4 |
_aCoding and Information Theory. _0https://scigraph.springernature.com/ontologies/product-market-codes/I15041 |
700 | 1 |
_aBokhari, M. U. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAgrawal, Namrata. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSaini, Dharmendra. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811085352 |
776 | 0 | 8 |
_iPrinted edition: _z9789811085376 |
830 | 0 |
_aAdvances in Intelligent Systems and Computing, _x2194-5357 ; _v729 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-981-10-8536-9 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c243317 _d243316 |