Cyber security and network security (Record no. 1668)

MARC details
000 -LEADER
fixed length control field 02188nam a2200265 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250716112017.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250716b2022|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119812548
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Pramanik, Sabyasachi
Relator term Editor
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Samanta, Debabrata
Relator term Co-Editor
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Vinay, M.
Relator term Co-Editor
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Guha, Abhijit
Relator term Co-Editor
245 ## - TITLE STATEMENT
Title Cyber security and network security
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2022.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxiv, 284p.
500 ## - GENERAL NOTE
General note CYBER SECURITY AND NETWORK SECURITY<br/><br/>Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.<br/><br/>Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.<br/><br/>This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cloud Forensics‐as‐a‐Service
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Robust Fraud Detection Mechanism
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Blockchain‐Based Identity Management Systems
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820921
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.8 (Online Access) EB0096 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha