Scientific Library of Tomsk State University

   E-catalog        

Image from Google Jackets
Normal view MARC view

Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations electronic resource edited by Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad.

Contributor(s): Hassanien, Aboul Ella [editor.] | Kim, Tai-hoon [editor.] | Kacprzyk, Janusz [editor.] | Awad, Ali Ismail [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Intelligent Systems Reference LibraryPublication details: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014Description: XXII, 585 p. 235 illus., 17 illus. in color. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783662436165Subject(s): engineering | Data protection | Artificial intelligence | Engineering | Computational Intelligence | Artificial Intelligence (incl. Robotics) | Systems and Data SecurityDDC classification: 006.3 LOC classification: Q342Online resources: Click here to access online
Contents:
Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications.
In: Springer eBooksSummary: This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  .
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications.

This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  .

There are no comments on this title.

to post a comment.