Machine Learning for Cyber Security / / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses to...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 |
---|---|
MitwirkendeR: | |
HerausgeberIn: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2022] ©2023 |
Year of Publication: | 2022 |
Language: | English |
Series: | De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
15 |
Online Access: | |
Physical Description: | 1 online resource (X, 148 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9783110766745 |
---|---|
ctrlnum |
(DE-B1597)600260 (OCoLC)1353268744 |
collection |
bib_alma |
record_format |
marc |
spelling |
Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram. Berlin ; Boston : De Gruyter, [2022] ©2023 1 online resource (X, 148 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 2626-5427 ; 15 Frontmatter -- Preface -- Contents -- List of contributors -- Editor’s biography -- Differential privacy: a solution to privacy issue in social networks -- Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- The ransomware: an emerging security challenge to the cyberspace -- Property-based attestation in device swarms: a machine learning approach -- A review of machine learning techniques in cybersecurity and research opportunities -- A framework for seborrheic keratosis skin disease identification using Vision Transformer -- Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Mai 2023) IT-Sicherheit. Künstliche Intelligenz. Maschinelles Lernen. Neuronale Netze. Machine Learning, Deep Learning, Neuronal Networks, Cybersecurity, IT-Security. Aswal, Kiran, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Baliyan, Nikhil, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Dobhal, Dinesh C., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Goyal, Nupur, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kamika,, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar Roy, Vikas, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar Singh, Ashwini, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Malik, Preeti, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Malik, Preeti, editor. edt http://id.loc.gov/vocabulary/relators/edt Mittal, Mohit, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Mittal, Sangeeta, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Mittal, Varsha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Nanath, Krishnadas, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Nautiyal, Lata, editor. edt http://id.loc.gov/vocabulary/relators/edt Nautiyal, Rohit, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Nijhawan, Rahul, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Pathak, Heman, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Rahman, Abdul, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Ram, Mangey, editor. edt http://id.loc.gov/vocabulary/relators/edt Rawat, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Thakur, Vasu, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Tiwari, Umesh K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Wedaj Kibret, Samuel, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 9783111175782 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English 9783110993899 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 9783110994810 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 English 9783110994223 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 9783110994193 ZDB-23-DEI EPUB 9783110766769 print 9783110766738 https://doi.org/10.1515/9783110766745 https://www.degruyter.com/isbn/9783110766745 Cover https://www.degruyter.com/document/cover/isbn/9783110766745/original |
language |
English |
format |
eBook |
author2 |
Aswal, Kiran, Aswal, Kiran, Baliyan, Nikhil, Baliyan, Nikhil, Dobhal, Dinesh C., Dobhal, Dinesh C., Goyal, Nupur, Goyal, Nupur, Kamika,, Kamika,, Kumar Roy, Vikas, Kumar Roy, Vikas, Kumar Singh, Ashwini, Kumar Singh, Ashwini, Malik, Preeti, Malik, Preeti, Malik, Preeti, Malik, Preeti, Mittal, Mohit, Mittal, Mohit, Mittal, Sangeeta, Mittal, Sangeeta, Mittal, Varsha, Mittal, Varsha, Nanath, Krishnadas, Nanath, Krishnadas, Nautiyal, Lata, Nautiyal, Lata, Nautiyal, Rohit, Nautiyal, Rohit, Nijhawan, Rahul, Nijhawan, Rahul, Pathak, Heman, Pathak, Heman, Rahman, Abdul, Rahman, Abdul, Ram, Mangey, Ram, Mangey, Rawat, Swati, Rawat, Swati, Thakur, Vasu, Thakur, Vasu, Tiwari, Umesh K., Tiwari, Umesh K., Wedaj Kibret, Samuel, Wedaj Kibret, Samuel, |
author_facet |
Aswal, Kiran, Aswal, Kiran, Baliyan, Nikhil, Baliyan, Nikhil, Dobhal, Dinesh C., Dobhal, Dinesh C., Goyal, Nupur, Goyal, Nupur, Kamika,, Kamika,, Kumar Roy, Vikas, Kumar Roy, Vikas, Kumar Singh, Ashwini, Kumar Singh, Ashwini, Malik, Preeti, Malik, Preeti, Malik, Preeti, Malik, Preeti, Mittal, Mohit, Mittal, Mohit, Mittal, Sangeeta, Mittal, Sangeeta, Mittal, Varsha, Mittal, Varsha, Nanath, Krishnadas, Nanath, Krishnadas, Nautiyal, Lata, Nautiyal, Lata, Nautiyal, Rohit, Nautiyal, Rohit, Nijhawan, Rahul, Nijhawan, Rahul, Pathak, Heman, Pathak, Heman, Rahman, Abdul, Rahman, Abdul, Ram, Mangey, Ram, Mangey, Rawat, Swati, Rawat, Swati, Thakur, Vasu, Thakur, Vasu, Tiwari, Umesh K., Tiwari, Umesh K., Wedaj Kibret, Samuel, Wedaj Kibret, Samuel, |
author2_variant |
k a ka k a ka n b nb n b nb d c d dc dcd d c d dc dcd n g ng n g ng k k r v k rv rvk r v k rv rvk s a k sa sak s a k sa sak p m pm p m pm p m pm p m pm m m mm m m mm s m sm s m sm v m vm v m vm k n kn k n kn l n ln l n ln r n rn r n rn r n rn r n rn h p hp h p hp a r ar a r ar m r mr m r mr s r sr s r sr v t vt v t vt u k t uk ukt u k t uk ukt k s w ks ksw k s w ks ksw |
author2_role |
MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR |
author_sort |
Aswal, Kiran, |
title |
Machine Learning for Cyber Security / |
spellingShingle |
Machine Learning for Cyber Security / De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , Frontmatter -- Preface -- Contents -- List of contributors -- Editor’s biography -- Differential privacy: a solution to privacy issue in social networks -- Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- The ransomware: an emerging security challenge to the cyberspace -- Property-based attestation in device swarms: a machine learning approach -- A review of machine learning techniques in cybersecurity and research opportunities -- A framework for seborrheic keratosis skin disease identification using Vision Transformer -- Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- Index |
title_full |
Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram. |
title_fullStr |
Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram. |
title_full_unstemmed |
Machine Learning for Cyber Security / ed. by Preeti Malik, Lata Nautiyal, Mangey Ram. |
title_auth |
Machine Learning for Cyber Security / |
title_alt |
Frontmatter -- Preface -- Contents -- List of contributors -- Editor’s biography -- Differential privacy: a solution to privacy issue in social networks -- Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- The ransomware: an emerging security challenge to the cyberspace -- Property-based attestation in device swarms: a machine learning approach -- A review of machine learning techniques in cybersecurity and research opportunities -- A framework for seborrheic keratosis skin disease identification using Vision Transformer -- Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- Index |
title_new |
Machine Learning for Cyber Security / |
title_sort |
machine learning for cyber security / |
series |
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , |
series2 |
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , |
publisher |
De Gruyter, |
publishDate |
2022 |
physical |
1 online resource (X, 148 p.) Issued also in print. |
contents |
Frontmatter -- Preface -- Contents -- List of contributors -- Editor’s biography -- Differential privacy: a solution to privacy issue in social networks -- Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- The ransomware: an emerging security challenge to the cyberspace -- Property-based attestation in device swarms: a machine learning approach -- A review of machine learning techniques in cybersecurity and research opportunities -- A framework for seborrheic keratosis skin disease identification using Vision Transformer -- Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- Index |
isbn |
9783110766745 9783111175782 9783110993899 9783110994810 9783110994223 9783110994193 9783110766769 9783110766738 |
issn |
2626-5427 ; |
url |
https://doi.org/10.1515/9783110766745 https://www.degruyter.com/isbn/9783110766745 https://www.degruyter.com/document/cover/isbn/9783110766745/original |
illustrated |
Not Illustrated |
doi_str_mv |
10.1515/9783110766745 |
oclc_num |
1353268744 |
work_keys_str_mv |
AT aswalkiran machinelearningforcybersecurity AT baliyannikhil machinelearningforcybersecurity AT dobhaldineshc machinelearningforcybersecurity AT goyalnupur machinelearningforcybersecurity AT kamika machinelearningforcybersecurity AT kumarroyvikas machinelearningforcybersecurity AT kumarsinghashwini machinelearningforcybersecurity AT malikpreeti machinelearningforcybersecurity AT mittalmohit machinelearningforcybersecurity AT mittalsangeeta machinelearningforcybersecurity AT mittalvarsha machinelearningforcybersecurity AT nanathkrishnadas machinelearningforcybersecurity AT nautiyallata machinelearningforcybersecurity AT nautiyalrohit machinelearningforcybersecurity AT nijhawanrahul machinelearningforcybersecurity AT pathakheman machinelearningforcybersecurity AT rahmanabdul machinelearningforcybersecurity AT rammangey machinelearningforcybersecurity AT rawatswati machinelearningforcybersecurity AT thakurvasu machinelearningforcybersecurity AT tiwariumeshk machinelearningforcybersecurity AT wedajkibretsamuel machinelearningforcybersecurity |
status_str |
n |
ids_txt_mv |
(DE-B1597)600260 (OCoLC)1353268744 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 English Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2022 |
is_hierarchy_title |
Machine Learning for Cyber Security / |
container_title |
Title is part of eBook package: De Gruyter DG Plus DeG Package 2023 Part 1 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1770177809549885440 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06473nam a22010575i 4500</leader><controlfield tag="001">9783110766745</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230529101353.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230529t20222023gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110766745</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110766745</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)600260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1353268744</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Machine Learning for Cyber Security /</subfield><subfield code="c">ed. by Preeti Malik, Lata Nautiyal, Mangey Ram.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (X, 148 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,</subfield><subfield code="x">2626-5427 ;</subfield><subfield code="v">15</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">List of contributors -- </subfield><subfield code="t">Editor’s biography -- </subfield><subfield code="t">Differential privacy: a solution to privacy issue in social networks -- </subfield><subfield code="t">Cracking Captcha using machine learning algorithms: an intersection of Captcha categories and ML algorithms -- </subfield><subfield code="t">The ransomware: an emerging security challenge to the cyberspace -- </subfield><subfield code="t">Property-based attestation in device swarms: a machine learning approach -- </subfield><subfield code="t">A review of machine learning techniques in cybersecurity and research opportunities -- </subfield><subfield code="t">A framework for seborrheic keratosis skin disease identification using Vision Transformer -- </subfield><subfield code="t">Mapping AICTE cybersecurity curriculum onto CyBOK: a case study -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Mai 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT-Sicherheit.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maschinelles Lernen.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Neuronale Netze.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning, Deep Learning, Neuronal Networks, Cybersecurity, IT-Security.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aswal, Kiran, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baliyan, Nikhil, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dobhal, Dinesh C., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goyal, Nupur, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamika,, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar Roy, Vikas, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar Singh, Ashwini, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Preeti, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malik, Preeti, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Mohit, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Sangeeta, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Varsha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nanath, Krishnadas, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Lata, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Rohit, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nijhawan, Rahul, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pathak, Heman, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Abdul, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thakur, Vasu, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Umesh K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wedaj Kibret, Samuel, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2023 Part 1</subfield><subfield code="z">9783111175782</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="z">9783110993899</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022</subfield><subfield code="z">9783110994810</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2022 English</subfield><subfield code="z">9783110994223</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2022</subfield><subfield code="z">9783110994193</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110766769</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110766738</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110766745</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110766745</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783110766745/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099389-9 EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099422-3 EBOOK PACKAGE Engineering, Computer Sciences 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-117578-2 DG Plus DeG Package 2023 Part 1</subfield><subfield code="b">2023</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_MTPY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2022</subfield></datafield></record></collection> |