|
|
|
|
LEADER |
04449cam a2200889 i 4500 |
001 |
1117276430 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
190903s2020 sz a ob 101 0 eng d |
015 |
|
|
|a GBB9F5383
|2 bnb
|
016 |
7 |
|
|a 019492566
|2 Uk
|
019 |
|
|
|a 1117306066
|a 1117701131
|
020 |
|
|
|a 9783030251284
|q (electronic bk.)
|
020 |
|
|
|a 3030251284
|q (electronic bk.)
|
020 |
|
|
|z 9783030251277
|
024 |
7 |
|
|a 10.1007/978-3-030-25128-4
|2 doi
|
024 |
8 |
|
|a 10.1007/978-3-030-25
|
035 |
|
|
|a (OCoLC)1117276430
|z (OCoLC)1117306066
|z (OCoLC)1117701131
|
037 |
|
|
|a com.springer.onix.9783030251284
|b Springer Nature
|
040 |
|
|
|a GW5XE
|b eng
|e rda
|e pn
|c GW5XE
|d LQU
|d UKMGB
|d OCLCF
|d OCLCO
|d OCLCQ
|d COM
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
049 |
|
|
|a COM6
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
111 |
2 |
|
|a International Conference on Applications and Techniques in Cyber Intelligence
|d (2019 :
|c Huainan Shi, China)
|
245 |
1 |
0 |
|a International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 :
|b Applications and Techniques in Cyber Intelligence /
|c Jemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman (editors).
|
264 |
|
1 |
|a Cham, Switzerland :
|b Springer,
|c [2020]
|
300 |
|
|
|a 1 online resource (xxxii, 2132 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a computer
|b c
|2 rdamedia.
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier.
|
490 |
1 |
|
|a Advances in intelligent systems and computing,
|x 2194-5365 ;
|v volume 1017.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed September 3, 2019).
|
520 |
|
|
|a This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|v Congresses.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
6 |
|a Surveillance des menaces informatiques
|v Congrès.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
7 |
|a Computer security.
|2 fast.
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast.
|
655 |
|
2 |
|a Congress.
|
655 |
|
7 |
|a proceedings (reports)
|2 aat.
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast.
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 lcgft.
|
655 |
|
7 |
|a Actes de congrès.
|2 rvmgf.
|
700 |
1 |
|
|a Abawajy, Jemal H.,
|d 1982-
|1 https://id.oclc.org/worldcat/entity/E39PCjKxbHq6KvmYVMmhDMG6jy,
|e editor.
|
700 |
1 |
|
|a Choo, Kim-Kwang Raymond,
|e editor.
|
700 |
1 |
|
|a Islam, Rafiqul,
|e editor.
|
700 |
1 |
|
|a Xu, Zheng,
|e editor.
|
700 |
1 |
|
|a Atiquzzaman, Mohammed,
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
830 |
|
0 |
|a Advances in intelligent systems and computing ;
|v 1017.
|
907 |
|
|
|a .b60843846
|b multi
|c -
|d 200330
|e 240516
|
998 |
|
|
|a (4)cue
|a cu
|b 240404
|c m
|d z
|e -
|f eng
|g sz
|h 0
|i 2
|
948 |
|
|
|a MARCIVE Overnight, in 2024.04
|
948 |
|
|
|a MARCIVE Overnight, in 2023.02
|
948 |
|
|
|a MARCIVE Over, 07/2021
|
948 |
|
|
|a MARCIVE Overnight, 05/2020
|
948 |
|
|
|a MARCIVE Comp, 2020.04
|
994 |
|
|
|a 92
|b COM
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2024.04
|
995 |
|
|
|a Loaded with m2btab.elec in 2024.04
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2023.02
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2021.07
|
995 |
|
|
|a Loaded with m2btab.elec in 2021.06
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2020.05
|
995 |
|
|
|a Loaded with m2btab.elec in 2020.04
|
995 |
|
|
|a Loaded with m2btab.ltiac in 2020.04
|
995 |
|
|
|a Loaded with m2btab.elec in 2020.03
|
995 |
|
|
|a Loaded with m2btab.auth in 2020.04
|
995 |
|
|
|a Loaded with m2btab.auth in 2020.05
|
995 |
|
|
|a Loaded with m2btab.auth in 2021.07
|
999 |
|
|
|e z
|
999 |
|
|
|a cue
|
989 |
|
|
|d cueme
|e - -
|f - -
|g -
|h 0
|i 0
|j 200
|k 240404
|l $0.00
|m
|n - -
|o -
|p 0
|q 0
|t 0
|x 0
|w SpringerLink
|1 .i151528585
|u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-030-25128-4
|3 SpringerLink
|z Click here for access
|