Bio-inspiring cyber security and cloud services trends and innovations /

This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting-edge technologies, algorithms, applications and insights for bio-inspiri...

Full description

Other Authors: Hassanien, Aboul Ella,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Heidelberg : Springer, [2014]
Physical Description: 1 online resource (xxii, 585 pages) : illustrations (some color).
Series: Intelligent systems reference library ; v. 70.
Subjects:
LEADER 05050cam a2200985 i 4500
001 883032974
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu---unuuu
008 140708s2014 gw a ob 000 0 eng d
019 |a 889305638  |a 1005768023  |a 1048166092  |a 1058393459  |a 1066429562  |a 1086549682  |a 1097101891  |a 1110763324  |a 1112543886 
020 |a 9783662436165  |q (electronic bk.) 
020 |a 3662436167  |q (electronic bk.) 
020 |a 3662436159  |q (print) 
020 |a 9783662436158  |q (print) 
020 |z 9783662436158 
024 7 |a 10.1007/978-3-662-43616-5  |2 doi 
035 |a (OCoLC)883032974  |z (OCoLC)889305638  |z (OCoLC)1005768023  |z (OCoLC)1048166092  |z (OCoLC)1058393459  |z (OCoLC)1066429562  |z (OCoLC)1086549682  |z (OCoLC)1097101891  |z (OCoLC)1110763324  |z (OCoLC)1112543886 
037 |b Springer 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d YDXCP  |d COO  |d N$T  |d UPM  |d IDEBK  |d CDX  |d N$T  |d NAM  |d E7B  |d EBLCP  |d OCLCO  |d DEBSZ  |d OCLCQ  |d OCLCO  |d DIBIB  |d OCLCO  |d OCLCA  |d Z5A  |d OCLCQ  |d ESU  |d OCLCQ  |d VT2  |d IOG  |d OCLCO  |d BUF  |d REB  |d OCLCF  |d CEF  |d U3W  |d OCLCQ  |d WYU  |d UWO  |d YOU  |d OCLCQ  |d DCT  |d ERF  |d AU@  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
049 |a COM6 
050 4 |a TK5105.59 
072 7 |a UYQ  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Bio-inspiring cyber security and cloud services :  |b trends and innovations /  |c Aboul Ella Hassanien, (and 3 others), editors. 
264 1 |a Heidelberg :  |b Springer,  |c [2014] 
300 |a 1 online resource (xxii, 585 pages) :  |b illustrations (some color). 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
490 1 |a Intelligent Systems Reference Library,  |x 1868-4394 ;  |v volume 70. 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 8, 2014). 
505 0 |a Bio-Inspiring in Complex Network Security -- Mobile Ad Hoc networks and Key managements -- Biometrics technology and applications. 
520 |a This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting-edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility. 
546 |a English. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Natural computation. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Calcul naturel. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Internet  |x Security measures.  |2 fast. 
650 7 |a Natural computation.  |2 fast. 
700 1 |a Hassanien, Aboul Ella,  |e editor. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Printed edition:  |z 9783662436158. 
830 0 |a Intelligent systems reference library ;  |v v. 70.  |x 1868-4394. 
907 |a .b42437404  |b multi  |c -  |d 140718  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.ltiac in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150386114  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-662-43616-5  |3 SpringerLink  |z Click here for access