| 000 | 02103cam a2200385 i 4500 | ||
|---|---|---|---|
| 001 | 22546109 | ||
| 003 | OSt | ||
| 005 | 20241112190923.0 | ||
| 008 | 220513s2022 paua b 001 0 eng | ||
| 010 | _a 2022012051 | ||
| 020 |
_a9781668439913 _q(hbk) |
||
| 040 |
_aDLC _beng _erda _cDLC _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.M592 2022 |
| 082 | 0 | 0 |
_a005.8 _223/eng/20220524 |
| 245 | 0 | 0 |
_aMethods, Implementation, and Application of Cyber Security Intelligence and Analytics / _cJena Om Prakash, H.L. Gururaj, M.R. Pooja, S.P. Pavan Kumar, editors. |
| 264 | 1 |
_aHershey, PA : _bInformation Science Reference, an imprint of IGI Global, _c[2022]. |
|
| 300 |
_axvii, 269 pages : _billustrations ; _c28 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | 0 | _aA volume in the advances in information security privacy, and ethics (AISPE) book series | |
| 504 | _aIncludes bibliographical references (pages 241-260) and index. | ||
| 520 |
_a"This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age"-- _cProvided by publisher. |
||
| 650 | 0 |
_aComputer networks _xSecurity measures _xData processing. |
|
| 650 | 0 | _aArtificial intelligence. | |
| 700 | 1 |
_aJena, Om Prakash _eeditor. |
|
| 700 | 1 |
_aGururaj, H. L., _d1988- _eeditor. |
|
| 700 | 1 |
_aPooja, M. R., _d1982- _eeditor. |
|
| 700 | 1 |
_aKumar, S. P. Pavan, _d1989- _eeditor. |
|
| 776 | 0 | 8 |
_iOnline version: _tMethods, implementation, and application of cyber security intelligence and analytics _dHershey, PA : Information Science Reference, an imprint of IGI Global, [2022] _z9781668439937 _w(DLC) 2022012052 |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK |
||
| 999 |
_c6234 _d6234 |
||