|
|
|
|
LEADER |
03027nam a2200529 4500 |
001 |
978-981-10-8536-9 |
003 |
DE-He213 |
005 |
20191026102148.0 |
007 |
cr nn 008mamaa |
008 |
180427s2018 si | s |||| 0|eng d |
020 |
|
|
|a 9789811085369
|9 978-981-10-8536-9
|
024 |
7 |
|
|a 10.1007/978-981-10-8536-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Cyber Security
|h [electronic resource] :
|b Proceedings of CSI 2015 /
|c edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XXIII, 505 p. 191 illus., 117 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Intelligent Systems and Computing,
|x 2194-5357 ;
|v 729
|
520 |
|
|
|a This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cybercrime.
|0 http://scigraph.springernature.com/things/product-market-codes/1B7000
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
700 |
1 |
|
|a Bokhari, M. U.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Agrawal, Namrata.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Saini, Dharmendra.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811085352
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811085376
|
830 |
|
0 |
|a Advances in Intelligent Systems and Computing,
|x 2194-5357 ;
|v 729
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-10-8536-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|