000 | 02776nam a22005175i 4500 | ||
---|---|---|---|
001 | vtls000545432 | ||
003 | RU-ToGU | ||
005 | 20210922083237.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662436165 _9978-3-662-43616-5 |
||
024 | 7 |
_a10.1007/978-3-662-43616-5 _2doi |
|
035 | _ato000545432 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aBio-inspiring Cyber Security and Cloud Services: Trends and Innovations _helectronic resource _cedited by Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad. |
260 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
||
300 |
_aXXII, 585 p. 235 illus., 17 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aIntelligent Systems Reference Library, _x1868-4394 ; _v70 |
|
505 | 0 | _aBio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications. | |
520 | _aThis volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  . | ||
650 | 0 |
_aengineering. _9224332 |
|
650 | 0 |
_aData protection. _9303937 |
|
650 | 0 |
_aArtificial intelligence. _9274099 |
|
650 | 1 | 4 |
_aEngineering. _9224332 |
650 | 2 | 4 |
_aComputational Intelligence. _9307538 |
650 | 2 | 4 |
_aArtificial Intelligence (incl. Robotics). _9274102 |
650 | 2 | 4 |
_aSystems and Data Security. _9303939 |
700 | 1 |
_aHassanien, Aboul Ella. _eeditor. _9415714 |
|
700 | 1 |
_aKim, Tai-hoon. _eeditor. _9331516 |
|
700 | 1 |
_aKacprzyk, Janusz. _eeditor. _9320048 |
|
700 | 1 |
_aAwad, Ali Ismail. _eeditor. _9415712 |
|
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
830 | 0 |
_aIntelligent Systems Reference Library, _9447053 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-43616-5 |
912 | _aZDB-2-ENG | ||
999 | _c402938 |