Computer Security Threats / / edited by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés.

This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of comp...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:London, England : : IntechOpen,, 2020.
Year of Publication:2020
Language:English
Physical Description:1 online resource (130 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603210804498
ctrlnum (CKB)5400000000043102
(NjHacI)995400000000043102
(EXLCZ)995400000000043102
collection bib_alma
record_format marc
spelling Computer Security Threats / edited by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés.
London, England : IntechOpen, 2020.
1 online resource (130 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on publisher supplied metadata and other sources.
This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures.
Computer security.
1-83962-381-0
Fernández-Caramés, Tiago M., editor.
Fraga-Lamas, Paula, editor.
Thomas, Ciza, editor.
language English
format eBook
author2 Fernández-Caramés, Tiago M.,
Fraga-Lamas, Paula,
Thomas, Ciza,
author_facet Fernández-Caramés, Tiago M.,
Fraga-Lamas, Paula,
Thomas, Ciza,
author2_variant t m f c tmf tmfc
p f l pfl
c t ct
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
title Computer Security Threats /
spellingShingle Computer Security Threats /
title_full Computer Security Threats / edited by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés.
title_fullStr Computer Security Threats / edited by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés.
title_full_unstemmed Computer Security Threats / edited by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés.
title_auth Computer Security Threats /
title_new Computer Security Threats /
title_sort computer security threats /
publisher IntechOpen,
publishDate 2020
physical 1 online resource (130 pages)
isbn 1-83962-381-0
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 C667 42020
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT fernandezcaramestiagom computersecuritythreats
AT fragalamaspaula computersecuritythreats
AT thomasciza computersecuritythreats
status_str n
ids_txt_mv (CKB)5400000000043102
(NjHacI)995400000000043102
(EXLCZ)995400000000043102
carrierType_str_mv cr
is_hierarchy_title Computer Security Threats /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1796653209064833025
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01955nam a2200301 4500</leader><controlfield tag="001">993603210804498</controlfield><controlfield tag="005">20230624172311.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230624s2020 enk o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000043102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995400000000043102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000043102</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.C667 2020</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Computer Security Threats /</subfield><subfield code="c">edited by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London, England :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (130 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-83962-381-0</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fernández-Caramés, Tiago M.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fraga-Lamas, Paula,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thomas, Ciza,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-06 03:28:08 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337936550004498&amp;Force_direct=true</subfield><subfield code="Z">5337936550004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337936550004498</subfield></datafield></record></collection>