Machine Learning for Cyber Security / / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.

This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses to...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
MitwirkendeR:
HerausgeberIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2022]
©2023
Year of Publication:2022
Language:English
Series:De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 15
Online Access:
Physical Description:1 online resource (X, 148 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783110766745
ctrlnum (DE-B1597)600260
(OCoLC)1353268744
collection bib_alma
record_format marc
spelling Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.
Berlin ; Boston : De Gruyter, [2022]
©2023
1 online resource (X, 148 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 2626-5427 ; 15
Frontmatter -- Preface -- Contents -- List of contributors -- Editor’s biography -- Differential privacy: a solution to privacy issue in social networks -- Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- The ransomware: an emerging security challenge to the cyberspace -- Property-based attestation in device swarms: a machine learning approach -- A review of machine learning techniques in cybersecurity and research opportunities -- A framework for seborrheic keratosis skin disease identification using Vision Transformer -- Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Mai 2023)
IT-Sicherheit.
Künstliche Intelligenz.
Maschinelles Lernen.
Neuronale Netze.
Machine Learning, Deep Learning, Neuronal Networks, Cybersecurity, IT-Security.
Aswal, Kiran, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Baliyan, Nikhil, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Dobhal, Dinesh C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Goyal, Nupur, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kamika,, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar Roy, Vikas, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar Singh, Ashwini, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Malik, Preeti, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Malik, Preeti, editor. edt http://id.loc.gov/vocabulary/relators/edt
Mittal, Mohit, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Mittal, Sangeeta, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Mittal, Varsha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Nanath, Krishnadas, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Nautiyal, Lata, editor. edt http://id.loc.gov/vocabulary/relators/edt
Nautiyal, Rohit, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Nijhawan, Rahul, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Pathak, Heman, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rahman, Abdul, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Ram, Mangey, editor. edt http://id.loc.gov/vocabulary/relators/edt
Rawat, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Thakur, Vasu, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tiwari, Umesh K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Wedaj Kibret, Samuel, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 9783111175782
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English 9783110993899
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 9783110994810 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 English 9783110994223
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 9783110994193 ZDB-23-DEI
EPUB 9783110766769
print 9783110766738
https://doi.org/10.1515/9783110766745
https://www.degruyter.com/isbn/9783110766745
Cover https://www.degruyter.com/document/cover/isbn/9783110766745/original
language English
format eBook
author2 Aswal, Kiran,
Aswal, Kiran,
Baliyan, Nikhil,
Baliyan, Nikhil,
Dobhal, Dinesh C.,
Dobhal, Dinesh C.,
Goyal, Nupur,
Goyal, Nupur,
Kamika,,
Kamika,,
Kumar Roy, Vikas,
Kumar Roy, Vikas,
Kumar Singh, Ashwini,
Kumar Singh, Ashwini,
Malik, Preeti,
Malik, Preeti,
Malik, Preeti,
Malik, Preeti,
Mittal, Mohit,
Mittal, Mohit,
Mittal, Sangeeta,
Mittal, Sangeeta,
Mittal, Varsha,
Mittal, Varsha,
Nanath, Krishnadas,
Nanath, Krishnadas,
Nautiyal, Lata,
Nautiyal, Lata,
Nautiyal, Rohit,
Nautiyal, Rohit,
Nijhawan, Rahul,
Nijhawan, Rahul,
Pathak, Heman,
Pathak, Heman,
Rahman, Abdul,
Rahman, Abdul,
Ram, Mangey,
Ram, Mangey,
Rawat, Swati,
Rawat, Swati,
Thakur, Vasu,
Thakur, Vasu,
Tiwari, Umesh K.,
Tiwari, Umesh K.,
Wedaj Kibret, Samuel,
Wedaj Kibret, Samuel,
author_facet Aswal, Kiran,
Aswal, Kiran,
Baliyan, Nikhil,
Baliyan, Nikhil,
Dobhal, Dinesh C.,
Dobhal, Dinesh C.,
Goyal, Nupur,
Goyal, Nupur,
Kamika,,
Kamika,,
Kumar Roy, Vikas,
Kumar Roy, Vikas,
Kumar Singh, Ashwini,
Kumar Singh, Ashwini,
Malik, Preeti,
Malik, Preeti,
Malik, Preeti,
Malik, Preeti,
Mittal, Mohit,
Mittal, Mohit,
Mittal, Sangeeta,
Mittal, Sangeeta,
Mittal, Varsha,
Mittal, Varsha,
Nanath, Krishnadas,
Nanath, Krishnadas,
Nautiyal, Lata,
Nautiyal, Lata,
Nautiyal, Rohit,
Nautiyal, Rohit,
Nijhawan, Rahul,
Nijhawan, Rahul,
Pathak, Heman,
Pathak, Heman,
Rahman, Abdul,
Rahman, Abdul,
Ram, Mangey,
Ram, Mangey,
Rawat, Swati,
Rawat, Swati,
Thakur, Vasu,
Thakur, Vasu,
Tiwari, Umesh K.,
Tiwari, Umesh K.,
Wedaj Kibret, Samuel,
Wedaj Kibret, Samuel,
author2_variant k a ka
k a ka
n b nb
n b nb
d c d dc dcd
d c d dc dcd
n g ng
n g ng
k
k
r v k rv rvk
r v k rv rvk
s a k sa sak
s a k sa sak
p m pm
p m pm
p m pm
p m pm
m m mm
m m mm
s m sm
s m sm
v m vm
v m vm
k n kn
k n kn
l n ln
l n ln
r n rn
r n rn
r n rn
r n rn
h p hp
h p hp
a r ar
a r ar
m r mr
m r mr
s r sr
s r sr
v t vt
v t vt
u k t uk ukt
u k t uk ukt
k s w ks ksw
k s w ks ksw
author2_role MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
author_sort Aswal, Kiran,
title Machine Learning for Cyber Security /
spellingShingle Machine Learning for Cyber Security /
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
Frontmatter --
Preface --
Contents --
List of contributors --
Editor’s biography --
Differential privacy: a solution to privacy issue in social networks --
Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms --
The ransomware: an emerging security challenge to the cyberspace --
Property-based attestation in device swarms: a machine learning approach --
A review of machine learning techniques in cybersecurity and research opportunities --
A framework for seborrheic keratosis skin disease identification using Vision Transformer --
Mapping AICTE cybersecurity curriculum onto CyBOK: a case study --
Index
title_full Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.
title_fullStr Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.
title_full_unstemmed Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.
title_auth Machine Learning for Cyber Security /
title_alt Frontmatter --
Preface --
Contents --
List of contributors --
Editor’s biography --
Differential privacy: a solution to privacy issue in social networks --
Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms --
The ransomware: an emerging security challenge to the cyberspace --
Property-based attestation in device swarms: a machine learning approach --
A review of machine learning techniques in cybersecurity and research opportunities --
A framework for seborrheic keratosis skin disease identification using Vision Transformer --
Mapping AICTE cybersecurity curriculum onto CyBOK: a case study --
Index
title_new Machine Learning for Cyber Security /
title_sort machine learning for cyber security /
series De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
series2 De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
publisher De Gruyter,
publishDate 2022
physical 1 online resource (X, 148 p.)
Issued also in print.
contents Frontmatter --
Preface --
Contents --
List of contributors --
Editor’s biography --
Differential privacy: a solution to privacy issue in social networks --
Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms --
The ransomware: an emerging security challenge to the cyberspace --
Property-based attestation in device swarms: a machine learning approach --
A review of machine learning techniques in cybersecurity and research opportunities --
A framework for seborrheic keratosis skin disease identification using Vision Transformer --
Mapping AICTE cybersecurity curriculum onto CyBOK: a case study --
Index
isbn 9783110766745
9783111175782
9783110993899
9783110994810
9783110994223
9783110994193
9783110766769
9783110766738
issn 2626-5427 ;
url https://doi.org/10.1515/9783110766745
https://www.degruyter.com/isbn/9783110766745
https://www.degruyter.com/document/cover/isbn/9783110766745/original
illustrated Not Illustrated
doi_str_mv 10.1515/9783110766745
oclc_num 1353268744
work_keys_str_mv AT aswalkiran machinelearningforcybersecurity
AT baliyannikhil machinelearningforcybersecurity
AT dobhaldineshc machinelearningforcybersecurity
AT goyalnupur machinelearningforcybersecurity
AT kamika machinelearningforcybersecurity
AT kumarroyvikas machinelearningforcybersecurity
AT kumarsinghashwini machinelearningforcybersecurity
AT malikpreeti machinelearningforcybersecurity
AT mittalmohit machinelearningforcybersecurity
AT mittalsangeeta machinelearningforcybersecurity
AT mittalvarsha machinelearningforcybersecurity
AT nanathkrishnadas machinelearningforcybersecurity
AT nautiyallata machinelearningforcybersecurity
AT nautiyalrohit machinelearningforcybersecurity
AT nijhawanrahul machinelearningforcybersecurity
AT pathakheman machinelearningforcybersecurity
AT rahmanabdul machinelearningforcybersecurity
AT rammangey machinelearningforcybersecurity
AT rawatswati machinelearningforcybersecurity
AT thakurvasu machinelearningforcybersecurity
AT tiwariumeshk machinelearningforcybersecurity
AT wedajkibretsamuel machinelearningforcybersecurity
status_str n
ids_txt_mv (DE-B1597)600260
(OCoLC)1353268744
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022
is_hierarchy_title Machine Learning for Cyber Security /
container_title Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1770177809549885440
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06473nam a22010575i 4500</leader><controlfield tag="001">9783110766745</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230529101353.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230529t20222023gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110766745</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110766745</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)600260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1353268744</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Machine Learning for Cyber Security /</subfield><subfield code="c">ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (X, 148 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,</subfield><subfield code="x">2626-5427 ;</subfield><subfield code="v">15</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">List of contributors -- </subfield><subfield code="t">Editor’s biography -- </subfield><subfield code="t">Differential privacy: a solution to privacy issue in social networks -- </subfield><subfield code="t">Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- </subfield><subfield code="t">The ransomware: an emerging security challenge to the cyberspace -- </subfield><subfield code="t">Property-based attestation in device swarms: a machine learning approach -- </subfield><subfield code="t">A review of machine learning techniques in cybersecurity and research opportunities -- </subfield><subfield code="t">A framework for seborrheic keratosis skin disease identification using Vision Transformer -- </subfield><subfield code="t">Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Mai 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT-Sicherheit.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maschinelles Lernen.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Neuronale Netze.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning, Deep Learning, Neuronal Networks, Cybersecurity, IT-Security.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aswal, Kiran, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baliyan, Nikhil, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dobhal, Dinesh C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goyal, Nupur, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamika,, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar Roy, Vikas, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar Singh, Ashwini, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Preeti, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Preeti, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Mohit, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Sangeeta, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Varsha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nanath, Krishnadas, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Lata, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Rohit, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nijhawan, Rahul, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pathak, Heman, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Abdul, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thakur, Vasu, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Umesh K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wedaj Kibret, Samuel, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2023 Part 1</subfield><subfield code="z">9783111175782</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="z">9783110993899</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022</subfield><subfield code="z">9783110994810</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2022 English</subfield><subfield code="z">9783110994223</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2022</subfield><subfield code="z">9783110994193</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110766769</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110766738</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110766745</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110766745</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783110766745/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099389-9 EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099422-3 EBOOK PACKAGE Engineering, Computer Sciences 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-117578-2 DG Plus DeG Package 2023 Part 1</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2022</subfield></datafield></record></collection>