Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingâ_"edge technologies, algorithms, applications and insights for bio-...
Guardado en:
Otros Autores: | , , , |
---|---|
Formato: | Electrónico Libro electrónico |
Lenguaje: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2014.
|
Colección: | Intelligent Systems Reference Library,
70 |
Materias: | |
Acceso en línea: | http://dx.doi.org/10.1007/978-3-662-43616-5 |
Aporte de: | Registro referencial: Solicitar el recurso aquí |
LEADER | 02328Cam#a22004575i#4500 | ||
---|---|---|---|
001 | INGC-EBK-000791 | ||
003 | AR-LpUFI | ||
005 | 20220927110119.0 | ||
007 | cr nn 008mamaa | ||
008 | 140626s2014 gw | s |||| 0|eng d | ||
020 | |a 9783662436165 | ||
024 | 7 | |a 10.1007/978-3-662-43616-5 |2 doi | |
050 | 4 | |a Q342 | |
072 | 7 | |a UYQ |2 bicssc | |
072 | 7 | |a COM004000 |2 bisacsh | |
245 | 1 | 0 | |a Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations |h [electronic resource] / |c edited by Aboul Ella Hassanien...[et al.]. |
260 | 1 | |a Berlin, Heidelberg : |b Springer Berlin Heidelberg : |b Imprint: Springer, |c 2014. | |
300 | |a xxii, 585 p. : |b il. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Intelligent Systems Reference Library, |x 1868-4394 ; |v 70 | |
505 | 0 | |a Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications. | |
520 | |a This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingâ_"edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility. Â . | ||
650 | 0 | |a Computer security. |9 260684 | |
650 | 1 | 4 | |a Engineering. |9 259622 |
650 | 2 | 4 | |a Computational Intelligence. |9 259845 |
650 | 2 | 4 | |a Artificial Intelligence (incl. Robotics). |9 259846 |
650 | 2 | 4 | |a Systems and Data Security. |9 260687 |
700 | 1 | |a Hassanien, Aboul Ella, |e ed. |9 261979 | |
700 | 1 | |a Kim, Tai-Hoon, |e ed. |9 261980 | |
700 | 1 | |a Kacprzyk, Janusz, |e ed. |9 260829 | |
700 | 1 | |a Awad, Ali Ismail, |e ed. |9 261981 | |
776 | 0 | 8 | |i Printed edition: |z 9783662436158 |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-662-43616-5 |
912 | |a ZDB-2-ENG | ||
929 | |a COM | ||
942 | |c EBK |6 _ | ||
950 | |a Engineering (Springer-11647) | ||
999 | |a SKV |c 28219 |d 28219 |