Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Implementing computational intellige...
~
Albastaki, Yousif, (1962-)
Implementing computational intelligence techniques for security systems design
Record Type:
Electronic resources : Monograph/item
Title/Author:
Implementing computational intelligence techniques for security systems designYousif Abdullatif Albastaki, Wasan Awad, editors.
other author:
Awad, Wasan,
Published:
Hershey, PA :Information Science Reference,2020.
Description:
1 online resource (xxii, 332 p.)
Subject:
Computer networksSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
ISBN:
9781799824206 (ebk.)
Implementing computational intelligence techniques for security systems design
Implementing computational intelligence techniques for security systems design
[electronic resource] /Yousif Abdullatif Albastaki, Wasan Awad, editors. - Hershey, PA :Information Science Reference,2020. - 1 online resource (xxii, 332 p.)
Includes bibliographical references.
"This book explores the applications of computational intelligence and other advanced techniques in information security"--
ISBN: 9781799824206 (ebk.)
LCCN: 2019039269Subjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .I437 2020
Dewey Class. No.: 006.3
Implementing computational intelligence techniques for security systems design
LDR
:00982nmm a2200229 a 4500
001
579096
005
20201023133940.0
008
201216s2020 paua b 000 0 eng
009
9cam a2200217 a 4500
010
$a
2019039269
020
$a
9781799824206 (ebk.)
020
$a
9781799824183 (hbk.)
020
$a
9781799824190 (pbk.)
035
$a
1091006394
040
$a
DLC
$b
eng
$c
DLC
$d
DLC
050
0 0
$a
TK5105.59
$b
.I437 2020
082
0 0
$a
006.3
$2
23
245
0 0
$a
Implementing computational intelligence techniques for security systems design
$h
[electronic resource] /
$c
Yousif Abdullatif Albastaki, Wasan Awad, editors.
260
$a
Hershey, PA :
$b
Information Science Reference,
$c
2020.
300
$a
1 online resource (xxii, 332 p.)
504
$a
Includes bibliographical references.
520
$a
"This book explores the applications of computational intelligence and other advanced techniques in information security"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Data protection.
$3
202312
650
0
$a
Security systems
$x
Design and construction.
$3
868302
650
0
$a
Computational intelligence.
$3
210824
700
1
$a
Awad, Wasan,
$d
1969-
$e
editor.
$3
868301
700
1
$a
Albastaki, Yousif,
$d
1962-
$e
editor.
$3
808155
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000183902
電子館藏
1圖書
電子書
EB TK5105.59 .I437 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2418-3
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login