000 | 02770cam a22004458i 4500 | ||
---|---|---|---|
001 | 22228302 | ||
003 | OSt | ||
005 | 20250523154837.0 | ||
008 | 210910s2022 flu bf 001 0 eng | ||
010 | _a 2021043552 | ||
020 |
_a978036736572 _q(hbk) |
||
020 |
_a9781032203751 _q(pbk) |
||
020 |
_z9780367808228 _q(ebk) |
||
040 |
_aDLC _beng _erda _cDLC _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.59 _b.I527 2022 |
082 | 0 | 0 |
_a005.8 _223/eng/20211110 |
245 | 0 | 0 |
_aInformation security handbook / _cedited by Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R.S. Tavares. |
250 | _aFirst edition. | ||
263 | _a2202 | ||
264 | 1 |
_aBoca Raton : _bCRC Press, _c[2022] |
|
300 | _apages cm | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
490 | 0 | _aInternet of everything (IoE): security and privacy paradigm | |
504 | _aIncludes bibliographical references and index. | ||
505 | 2 | _aSC-MCHMP : score based cluster level hybrid multi-channel MAC protocol for wireless sensor network -- Software defined networking (SDN) security concerns -- Clustering in wireless sensor netowrks using adaptive neuro fuzzy inference logic. | |
520 |
_a"This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts, serves as a manual for industry, while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through IoT ecosystem and implications to the real world and at the same time explains the concepts of IoT-related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful"-- _cProvided by publisher. |
||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
700 | 1 |
_aZaman, Noor, _d1972- _eeditor. |
|
700 | 1 |
_aHussain, Khalid, _eeditor. |
|
700 | 1 |
_aHumayun, Mamoona, _eeditor. |
|
700 | 1 |
_aAbdullah, Azween Bin, _d1961- _eeditor. |
|
700 | 1 |
_aTavares, João Manuel R. S., _eeditor. |
|
776 | 0 | 8 |
_iOnline version: _tInformation security handbook _bFirst edition _dBoca Raton : CRC Press, 2022 _z9780367808228 _w(DLC) 2021043553 |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK |
||
955 |
_brk14 2021-09-10 _crk14 2021-09-10 telework to subj |
||
999 |
_c10538 _d10538 |