|
|
|
|
LEADER |
01603cam a22004577i 4500 |
001 |
181-020106372 |
003 |
Uk |
005 |
20230924065307.0 |
008 |
200723s2021 sz a b 0|| 0 eng d |
007 |
tu |
020 |
|
|
|a 3030570231
|q hardcover
|
020 |
|
|
|a 9783030570231
|q hardcover
|
020 |
|
|
|z 9783030570248
|q ebook
|
035 |
|
|
|a (OCoLC)1176318938
|
040 |
|
|
|a YDX
|b eng
|c YDX
|d YDXIT
|d OCLCO
|d Uk
|e rda
|
042 |
|
|
|a ukblderived
|
050 |
|
4 |
|a Q335
|b .M33 2021
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
0 |
0 |
|a Machine Intelligence and Big Data Analytics for Cybersecurity Applications
|c Yassine Maleh [and three others], editors
|
264 |
|
1 |
|a Cham, Switzerland
|b Springer
|c [2021]
|
300 |
|
|
|a xiii, 539 pages :
|b illustrations ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
490 |
1 |
|
|a Studies in Computational Intelligence ;
|v volume 919
|
530 |
|
|
|a Also published electronically.
|
504 |
|
|
|a Includes bibliographical references.
|
540 |
|
|
|a Current copyright fee: GBP19.00
|c 42\0
|5 Uk
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Big data.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Machine learning.
|
650 |
|
0 |
|a Computer crimes.
|
700 |
1 |
|
|a Maleh, Yassine
|d 1987-
|e editor.
|
700 |
1 |
|
|a Shojafar, Mohammad
|e editor.
|
700 |
1 |
|
|a Alazab, Mamoun
|e editor.
|
700 |
1 |
|
|a Baddi, Youssef
|e editor.
|
830 |
|
0 |
|a Studies in computational intelligence ;
|v v. 919.
|
856 |
|
|
|3 1850-9999
|u http://link.springer.com/
|x BLDSS
|
980 |
|
|
|a 020106372
|b 181
|c sid-181-col-blfidbbi
|
SOLR
_version_ |
1778756086024634368 |
access_facet |
Local Holdings |
author2 |
Maleh, Yassine, Shojafar, Mohammad, Alazab, Mamoun, Baddi, Youssef |
author2_role |
edt, edt, edt, edt |
author2_variant |
y m ym, m s ms, m a ma, y b yb |
author_facet |
Maleh, Yassine, Shojafar, Mohammad, Alazab, Mamoun, Baddi, Youssef |
building |
Library A |
callnumber-first |
Q - Science |
callnumber-label |
Q335 |
callnumber-raw |
Q335 .M33 2021 |
callnumber-search |
Q335 .M33 2021 |
callnumber-sort |
Q 3335 M33 42021 |
callnumber-subject |
Q - General Science |
collection |
sid-181-col-blfidbbi |
ctrlnum |
(OCoLC)1176318938 |
dewey-full |
006.3 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
006 - Special computer methods |
dewey-raw |
006.3 |
dewey-search |
006.3 |
dewey-sort |
16.3 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Local |
finc_class_facet |
Informatik, Allgemeine Naturwissenschaft |
fincclass_txtF_mv |
science-computerscience |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
181-020106372 |
illustrated |
Illustrated |
imprint |
Cham, Switzerland, Springer, [2021] |
imprint_str_mv |
Cham, Switzerland Springer [2021] |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
3030570231, 9783030570231 |
isbn_isn_mv |
9783030570248 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:26:34.267Z |
match_str |
maleh2021machineintelligenceandbigdataanalyticsforcybersecurityapplications |
mega_collection |
British Library Catalogue |
oclc_num |
1176318938 |
physical |
xiii, 539 pages; illustrations; 24 cm |
publishDate |
[2021] |
publishDateSort |
2021 |
publishPlace |
Cham, Switzerland |
publisher |
Springer |
record_format |
marcfinc |
record_id |
020106372 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
series |
Studies in computational intelligence, v. 919 |
series2 |
Studies in Computational Intelligence ; volume 919 |
source_id |
181 |
spelling |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications Yassine Maleh [and three others], editors, Cham, Switzerland Springer [2021], xiii, 539 pages : illustrations ; 24 cm., text txt rdacontent, unmediated n rdamedia, volume nc rdacarrier, Studies in Computational Intelligence ; volume 919, Also published electronically., Includes bibliographical references., Current copyright fee: GBP19.00 42\0 Uk, Artificial intelligence., Big data., Computer security., Computational intelligence., Machine learning., Computer crimes., Maleh, Yassine 1987- editor., Shojafar, Mohammad editor., Alazab, Mamoun editor., Baddi, Youssef editor., Studies in computational intelligence ; v. 919., 1850-9999 http://link.springer.com/ BLDSS |
spellingShingle |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications, Studies in computational intelligence, v. 919, Artificial intelligence., Big data., Computer security., Computational intelligence., Machine learning., Computer crimes. |
title |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications |
title_auth |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications |
title_full |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications Yassine Maleh [and three others], editors |
title_fullStr |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications Yassine Maleh [and three others], editors |
title_full_unstemmed |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications Yassine Maleh [and three others], editors |
title_in_hierarchy |
v. 919.. Machine Intelligence and Big Data Analytics for Cybersecurity Applications ([2021]) |
title_short |
Machine Intelligence and Big Data Analytics for Cybersecurity Applications |
title_sort |
machine intelligence and big data analytics for cybersecurity applications |
topic |
Artificial intelligence., Big data., Computer security., Computational intelligence., Machine learning., Computer crimes. |
topic_facet |
Artificial intelligence., Big data., Computer security., Computational intelligence., Machine learning., Computer crimes. |