Algorithms : : Big Data, Optimization Techniques, Cyber Security / / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.
Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimiza...
Saved in:
MitwirkendeR: | |
---|---|
HerausgeberIn: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2024] ©2024 |
Year of Publication: | 2024 |
Language: | English |
Series: | De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
17 |
Online Access: | |
Physical Description: | 1 online resource (VIII, 181 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9783111229157 |
---|---|
ctrlnum |
(DE-B1597)650495 |
collection |
bib_alma |
record_format |
marc |
spelling |
Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar. Berlin ; Boston : De Gruyter, [2024] ©2024 1 online resource (VIII, 181 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 2626-5427 ; 17 Frontmatter -- Preface -- Contents -- Machine learning-enabled techniques for speech categorization -- Comprehensive study of cybersecurity issues and challenges -- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- A comparative study on security issues and clustering of wireless sensor networks -- Heuristic approach and its application to solve NP-complete traveling salesman problem -- Assessment of fake news detection from machine learning and deep learning techniques -- Spam mail detection various machine learning methods and their comparisons -- Cybersecurity threats in modern digital world -- Mechanism to protect the physical boundary of organization where the private and public networks encounter -- By combining binary search and insertion sort, a sorting method for small input size -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimization Techniques and Cloud & Cyber Security Systems in order to explore their power and limitations. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jul 2024) Algorithmen. Cybersicherheit. Einschränkungen. Malware. Optimierung. Sicherheitsmechanismen. COMPUTERS / Programming / Algorithms. bisacsh Security Mechanism, Algorithms, Cyber security, Malwares, Optimization, Limitations. Bhatt, Aditya, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Bijalwan, Rahul, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Bora, Devesh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Brijlall, Deonarain, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Dhondiyal, Shiv Ashish, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Dimri, Sushil C., editor. edt http://id.loc.gov/vocabulary/relators/edt Dimri, Sushil Chandra, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Dogra, Akash, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Gautam, Parth, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Indu, Richa, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kharola, Shristi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar, Akshay, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar, Akshay, editor. edt http://id.loc.gov/vocabulary/relators/edt Kumar, Ashwani, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Kumar, Bhawnesh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Maurya, Sudhanshu, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Negi, Harendra Singh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Omer, Apurva, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Pande, Jeetendra, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Panwar, Neeraj, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Patel, Chandrashekhar, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Patwal, Akshita, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Rajput, Ishwari Singh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Ram, Mangey, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Ranjan Giri, Rajiv, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Rawat, Vandana, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Saxena, Abhay, editor. edt http://id.loc.gov/vocabulary/relators/edt Saxena, Aditi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Shah, Megha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Unhelkar, Bhuvan, editor. edt http://id.loc.gov/vocabulary/relators/edt Usmani, Tauqeer Ahmed, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb Yadav, Bhanu Priya, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb EPUB 9783111229638 print 9783111228006 https://doi.org/10.1515/9783111229157 https://www.degruyter.com/isbn/9783111229157 Cover https://www.degruyter.com/document/cover/isbn/9783111229157/original |
language |
English |
format |
eBook |
author2 |
Bhatt, Aditya, Bhatt, Aditya, Bijalwan, Rahul, Bijalwan, Rahul, Bora, Devesh, Bora, Devesh, Brijlall, Deonarain, Brijlall, Deonarain, Dhondiyal, Shiv Ashish, Dhondiyal, Shiv Ashish, Dimri, Sushil C., Dimri, Sushil C., Dimri, Sushil Chandra, Dimri, Sushil Chandra, Dogra, Akash, Dogra, Akash, Gautam, Parth, Gautam, Parth, Indu, Richa, Indu, Richa, Kharola, Shristi, Kharola, Shristi, Kumar, Akshay, Kumar, Akshay, Kumar, Akshay, Kumar, Akshay, Kumar, Ashwani, Kumar, Ashwani, Kumar, Bhawnesh, Kumar, Bhawnesh, Maurya, Sudhanshu, Maurya, Sudhanshu, Negi, Harendra Singh, Negi, Harendra Singh, Omer, Apurva, Omer, Apurva, Pande, Jeetendra, Pande, Jeetendra, Panwar, Neeraj, Panwar, Neeraj, Patel, Chandrashekhar, Patel, Chandrashekhar, Patwal, Akshita, Patwal, Akshita, Rajput, Ishwari Singh, Rajput, Ishwari Singh, Ram, Mangey, Ram, Mangey, Ranjan Giri, Rajiv, Ranjan Giri, Rajiv, Rawat, Vandana, Rawat, Vandana, Saxena, Abhay, Saxena, Abhay, Saxena, Aditi, Saxena, Aditi, Shah, Megha, Shah, Megha, Unhelkar, Bhuvan, Unhelkar, Bhuvan, Usmani, Tauqeer Ahmed, Usmani, Tauqeer Ahmed, Yadav, Bhanu Priya, Yadav, Bhanu Priya, |
author_facet |
Bhatt, Aditya, Bhatt, Aditya, Bijalwan, Rahul, Bijalwan, Rahul, Bora, Devesh, Bora, Devesh, Brijlall, Deonarain, Brijlall, Deonarain, Dhondiyal, Shiv Ashish, Dhondiyal, Shiv Ashish, Dimri, Sushil C., Dimri, Sushil C., Dimri, Sushil Chandra, Dimri, Sushil Chandra, Dogra, Akash, Dogra, Akash, Gautam, Parth, Gautam, Parth, Indu, Richa, Indu, Richa, Kharola, Shristi, Kharola, Shristi, Kumar, Akshay, Kumar, Akshay, Kumar, Akshay, Kumar, Akshay, Kumar, Ashwani, Kumar, Ashwani, Kumar, Bhawnesh, Kumar, Bhawnesh, Maurya, Sudhanshu, Maurya, Sudhanshu, Negi, Harendra Singh, Negi, Harendra Singh, Omer, Apurva, Omer, Apurva, Pande, Jeetendra, Pande, Jeetendra, Panwar, Neeraj, Panwar, Neeraj, Patel, Chandrashekhar, Patel, Chandrashekhar, Patwal, Akshita, Patwal, Akshita, Rajput, Ishwari Singh, Rajput, Ishwari Singh, Ram, Mangey, Ram, Mangey, Ranjan Giri, Rajiv, Ranjan Giri, Rajiv, Rawat, Vandana, Rawat, Vandana, Saxena, Abhay, Saxena, Abhay, Saxena, Aditi, Saxena, Aditi, Shah, Megha, Shah, Megha, Unhelkar, Bhuvan, Unhelkar, Bhuvan, Usmani, Tauqeer Ahmed, Usmani, Tauqeer Ahmed, Yadav, Bhanu Priya, Yadav, Bhanu Priya, |
author2_variant |
a b ab a b ab r b rb r b rb d b db d b db d b db d b db s a d sa sad s a d sa sad s c d sc scd s c d sc scd s c d sc scd s c d sc scd a d ad a d ad p g pg p g pg r i ri r i ri s k sk s k sk a k ak a k ak a k ak a k ak a k ak a k ak b k bk b k bk s m sm s m sm h s n hs hsn h s n hs hsn a o ao a o ao j p jp j p jp n p np n p np c p cp c p cp a p ap a p ap i s r is isr i s r is isr m r mr m r mr g r r gr grr g r r gr grr v r vr v r vr a s as a s as a s as a s as m s ms m s ms b u bu b u bu t a u ta tau t a u ta tau b p y bp bpy b p y bp bpy |
author2_role |
MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR HerausgeberIn HerausgeberIn MitwirkendeR MitwirkendeR MitwirkendeR MitwirkendeR |
author_sort |
Bhatt, Aditya, |
title |
Algorithms : Big Data, Optimization Techniques, Cyber Security / |
spellingShingle |
Algorithms : Big Data, Optimization Techniques, Cyber Security / De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , Frontmatter -- Preface -- Contents -- Machine learning-enabled techniques for speech categorization -- Comprehensive study of cybersecurity issues and challenges -- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- A comparative study on security issues and clustering of wireless sensor networks -- Heuristic approach and its application to solve NP-complete traveling salesman problem -- Assessment of fake news detection from machine learning and deep learning techniques -- Spam mail detection various machine learning methods and their comparisons -- Cybersecurity threats in modern digital world -- Mechanism to protect the physical boundary of organization where the private and public networks encounter -- By combining binary search and insertion sort, a sorting method for small input size -- Index |
title_sub |
Big Data, Optimization Techniques, Cyber Security / |
title_full |
Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar. |
title_fullStr |
Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar. |
title_full_unstemmed |
Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar. |
title_auth |
Algorithms : Big Data, Optimization Techniques, Cyber Security / |
title_alt |
Frontmatter -- Preface -- Contents -- Machine learning-enabled techniques for speech categorization -- Comprehensive study of cybersecurity issues and challenges -- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- A comparative study on security issues and clustering of wireless sensor networks -- Heuristic approach and its application to solve NP-complete traveling salesman problem -- Assessment of fake news detection from machine learning and deep learning techniques -- Spam mail detection various machine learning methods and their comparisons -- Cybersecurity threats in modern digital world -- Mechanism to protect the physical boundary of organization where the private and public networks encounter -- By combining binary search and insertion sort, a sorting method for small input size -- Index |
title_new |
Algorithms : |
title_sort |
algorithms : big data, optimization techniques, cyber security / |
series |
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , |
series2 |
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , |
publisher |
De Gruyter, |
publishDate |
2024 |
physical |
1 online resource (VIII, 181 p.) Issued also in print. |
contents |
Frontmatter -- Preface -- Contents -- Machine learning-enabled techniques for speech categorization -- Comprehensive study of cybersecurity issues and challenges -- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- A comparative study on security issues and clustering of wireless sensor networks -- Heuristic approach and its application to solve NP-complete traveling salesman problem -- Assessment of fake news detection from machine learning and deep learning techniques -- Spam mail detection various machine learning methods and their comparisons -- Cybersecurity threats in modern digital world -- Mechanism to protect the physical boundary of organization where the private and public networks encounter -- By combining binary search and insertion sort, a sorting method for small input size -- Index |
isbn |
9783111229157 9783111229638 9783111228006 |
issn |
2626-5427 ; |
url |
https://doi.org/10.1515/9783111229157 https://www.degruyter.com/isbn/9783111229157 https://www.degruyter.com/document/cover/isbn/9783111229157/original |
illustrated |
Not Illustrated |
doi_str_mv |
10.1515/9783111229157 |
work_keys_str_mv |
AT bhattaditya algorithmsbigdataoptimizationtechniquescybersecurity AT bijalwanrahul algorithmsbigdataoptimizationtechniquescybersecurity AT boradevesh algorithmsbigdataoptimizationtechniquescybersecurity AT brijlalldeonarain algorithmsbigdataoptimizationtechniquescybersecurity AT dhondiyalshivashish algorithmsbigdataoptimizationtechniquescybersecurity AT dimrisushilc algorithmsbigdataoptimizationtechniquescybersecurity AT dimrisushilchandra algorithmsbigdataoptimizationtechniquescybersecurity AT dograakash algorithmsbigdataoptimizationtechniquescybersecurity AT gautamparth algorithmsbigdataoptimizationtechniquescybersecurity AT induricha algorithmsbigdataoptimizationtechniquescybersecurity AT kharolashristi algorithmsbigdataoptimizationtechniquescybersecurity AT kumarakshay algorithmsbigdataoptimizationtechniquescybersecurity AT kumarashwani algorithmsbigdataoptimizationtechniquescybersecurity AT kumarbhawnesh algorithmsbigdataoptimizationtechniquescybersecurity AT mauryasudhanshu algorithmsbigdataoptimizationtechniquescybersecurity AT negiharendrasingh algorithmsbigdataoptimizationtechniquescybersecurity AT omerapurva algorithmsbigdataoptimizationtechniquescybersecurity AT pandejeetendra algorithmsbigdataoptimizationtechniquescybersecurity AT panwarneeraj algorithmsbigdataoptimizationtechniquescybersecurity AT patelchandrashekhar algorithmsbigdataoptimizationtechniquescybersecurity AT patwalakshita algorithmsbigdataoptimizationtechniquescybersecurity AT rajputishwarisingh algorithmsbigdataoptimizationtechniquescybersecurity AT rammangey algorithmsbigdataoptimizationtechniquescybersecurity AT ranjangirirajiv algorithmsbigdataoptimizationtechniquescybersecurity AT rawatvandana algorithmsbigdataoptimizationtechniquescybersecurity AT saxenaabhay algorithmsbigdataoptimizationtechniquescybersecurity AT saxenaaditi algorithmsbigdataoptimizationtechniquescybersecurity AT shahmegha algorithmsbigdataoptimizationtechniquescybersecurity AT unhelkarbhuvan algorithmsbigdataoptimizationtechniquescybersecurity AT usmanitauqeerahmed algorithmsbigdataoptimizationtechniquescybersecurity AT yadavbhanupriya algorithmsbigdataoptimizationtechniquescybersecurity |
status_str |
n |
ids_txt_mv |
(DE-B1597)650495 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Algorithms : Big Data, Optimization Techniques, Cyber Security / |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1806145991410188288 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06690nam a2201009 4500 </leader><controlfield tag="001">9783111229157</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240703114541.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240703t20242024gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783111229157</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783111229157</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)650495</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM051300</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Algorithms :</subfield><subfield code="b">Big Data, Optimization Techniques, Cyber Security /</subfield><subfield code="c">ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (VIII, 181 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,</subfield><subfield code="x">2626-5427 ;</subfield><subfield code="v">17</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Machine learning-enabled techniques for speech categorization -- </subfield><subfield code="t">Comprehensive study of cybersecurity issues and challenges -- </subfield><subfield code="t">An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- </subfield><subfield code="t">A comparative study on security issues and clustering of wireless sensor networks -- </subfield><subfield code="t">Heuristic approach and its application to solve NP-complete traveling salesman problem -- </subfield><subfield code="t">Assessment of fake news detection from machine learning and deep learning techniques -- </subfield><subfield code="t">Spam mail detection various machine learning methods and their comparisons -- </subfield><subfield code="t">Cybersecurity threats in modern digital world -- </subfield><subfield code="t">Mechanism to protect the physical boundary of organization where the private and public networks encounter -- </subfield><subfield code="t">By combining binary search and insertion sort, a sorting method for small input size -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimization Techniques and Cloud & Cyber Security Systems in order to explore their power and limitations.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jul 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithmen.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybersicherheit.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Einschränkungen.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optimierung.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitsmechanismen.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming / Algorithms.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Mechanism, Algorithms, Cyber security, Malwares, Optimization, Limitations.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhatt, Aditya, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bijalwan, Rahul, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bora, Devesh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brijlall, Deonarain, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dhondiyal, Shiv Ashish, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dimri, Sushil C., </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dimri, Sushil Chandra, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dogra, Akash, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gautam, Parth, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Indu, Richa, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kharola, Shristi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Akshay, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Akshay, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Ashwani, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Bhawnesh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maurya, Sudhanshu, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Negi, Harendra Singh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Omer, Apurva, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pande, Jeetendra, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Panwar, Neeraj, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patel, Chandrashekhar, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patwal, Akshita, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajput, Ishwari Singh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ranjan Giri, Rajiv, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Vandana, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saxena, Abhay, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saxena, Aditi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shah, Megha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Unhelkar, Bhuvan, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Usmani, Tauqeer Ahmed, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Bhanu Priya, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783111229638</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783111228006</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783111229157</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783111229157</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783111229157/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection> |