Methods, implementation, and application of cyber security intelligence and analytics
"This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age"--
| Other Authors: | , , , |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global,
[2022]
|
| Series: | Advances in information security, privacy, and ethics (AISPE) book series.
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 02355cam a2200517 i 4500 | ||
|---|---|---|---|
| 001 | koha001013779 | ||
| 003 | OCoLC | ||
| 005 | 20250222070012.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 220513s2022 paua ob 001 0 eng | ||
| 010 | |a 2022012052 | ||
| 035 | |a koha001013779 | ||
| 040 | |a DLC |b eng |e rda |e pn |c DLC |d N$T |d OCLCQ |d YDX | ||
| 019 | |a 1319837321 | ||
| 020 | |a 9781668439937 |q electronic book | ||
| 020 | |a 166843993X |q electronic book | ||
| 020 | |a 9781668439944 |q electronic book | ||
| 020 | |a 1668439948 |q electronic book | ||
| 020 | |z 9781668439913 |q hardcover | ||
| 020 | |z 9781668439920 |q paperback | ||
| 042 | |a pcc | ||
| 050 | 0 | 4 | |a TK5105.59 |b .M498 2022 |
| 082 | 0 | 0 | |a 005.8 |2 23/eng/20220524 |
| 049 | |a MAIN | ||
| 245 | 0 | 0 | |a Methods, implementation, and application of cyber security intelligence and analytics |c Jena Om Prakash, H.L. Gururaj, M.R. Pooja, S.P. Pavan Kumar. |
| 264 | 1 | |a Hershey, PA |b Information Science Reference, an imprint of IGI Global, |c [2022] | |
| 300 | |a 1 online resource (xvii, 269 pages) |b illustrations (chiefly color). | ||
| 490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a "This book looks at the intersection of Artificial Intelligence and Cyber security which has emerged as one of the most promising use cases for the advancement of Cyber security in the technological age"-- |c Provided by publisher | ||
| 588 | |a Description based on online resource; title from digital title page (viewed on August 05, 2022). | ||
| 653 | 0 | |a Computer networks |x Security measures |x Data processing. | |
| 653 | 0 | |a Artificial intelligence. | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 700 | 1 | |a Jena, Om Prakash, |9 912505 | |
| 700 | 1 | |a Gururaj, H. L., |d 1988- |9 912506 | |
| 700 | 1 | |a Pooja, M. R., |d 1982- |9 912507 | |
| 700 | 1 | |a Kumar, S. P. Pavan, |d 1989- |9 912508 | |
| 830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. |9 911200 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/3324972.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013779 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1013779 |d 1013779 | ||
| 039 | |||
