|
|
|
|
LEADER |
02458cam a22005292 4500 |
001 |
183-1755520131 |
003 |
DE-627 |
005 |
20221220102127.0 |
007 |
tu |
008 |
210421s2021 sz ||||| 00| ||eng c |
020 |
|
|
|a 9783030570231
|c : (hbk)
|9 978-3-030-57023-1
|
035 |
|
|
|a (DE-627)1755520131
|
035 |
|
|
|a (DE-599)BVBBV047104542
|
035 |
|
|
|a (DE-604)BV047104542
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-CH
|
082 |
0 |
|
|a 620.00285
|
084 |
|
|
|a ST 300
|2 rvk
|0 (DE-625)rvk/143650:
|
084 |
|
|
|a 54.72
|2 bkl
|
084 |
|
|
|a 54.80
|2 bkl
|
100 |
1 |
|
|a Maleh, Yassine
|d 1987-
|e HerausgeberIn
|0 (DE-588)1190215594
|0 (DE-627)1668913240
|4 edt
|
245 |
1 |
0 |
|a Machine intelligence and big data analytics for cybersecurity applications
|c Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi, editors
|
264 |
|
1 |
|a Cham
|b Springer
|c 2021
|
300 |
|
|
|a xiii, 539 Seiten
|b Illustrationen, Diagramme (überwiegend farbig)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
490 |
1 |
|
|a Studies in computational intelligence
|v volume 919
|
500 |
|
|
|a Titelaufnahme entstanden auf Grundlage der Online-Ausgabe
|
689 |
0 |
0 |
|D s
|0 (DE-588)4802620-7
|0 (DE-627)472310364
|0 (DE-576)216543657
|a Big Data
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4123037-1
|0 (DE-627)105758051
|0 (DE-576)209556331
|a Datenanalyse
|2 gnd
|
689 |
0 |
|
|5 (DE-627)
|
700 |
1 |
|
|a Shojafar, Mohammad
|e HerausgeberIn
|4 edt
|
700 |
1 |
|
|a Alazab, Mamoun
|e HerausgeberIn
|4 edt
|
700 |
1 |
|
|a Baddi, Youssef
|e HerausgeberIn
|4 edt
|
776 |
1 |
|
|z 9783030570248
|
776 |
0 |
8 |
|i Erscheint auch als
|n Online-Ausgabe
|z 978-3-030-57024-8
|
830 |
|
0 |
|a Studies in computational intelligence
|v volume 919
|9 919
|w (DE-627)498966216
|w (DE-576)117828025
|w (DE-600)2202445-1
|x 1860-949X
|7 ns
|
856 |
4 |
2 |
|u https://www.gbv.de/dms/tib-ub-hannover/1755520131.pdf
|m V:DE-601
|m B:DE-89
|q pdf/application
|3 Inhaltsverzeichnis
|
924 |
0 |
|
|a 3914048476
|b DE-89
|9 89
|c GBV
|d c
|g RS 5317(919)
|
936 |
r |
v |
|a ST 300
|b Allgemeines
|k Informatik
|k Monografien
|k Künstliche Intelligenz
|k Allgemeines
|0 (DE-627)1271119005
|0 (DE-625)rvk/143650:
|0 (DE-576)201119005
|
936 |
b |
k |
|a 54.72
|j Künstliche Intelligenz
|0 (DE-627)10641240X
|
936 |
b |
k |
|a 54.80
|j Angewandte Informatik
|0 (DE-627)106417967
|
951 |
|
|
|a BO
|
980 |
|
|
|a 1755520131
|b 183
|c sid-183-col-kxpbbi
|
SOLR
_version_ |
1799795393632927744 |
author2 |
Maleh, Yassine, Shojafar, Mohammad, Alazab, Mamoun, Baddi, Youssef |
author2_role |
edt, edt, edt, edt |
author2_variant |
y m ym, m s ms, m a ma, y b yb |
author_facet |
Maleh, Yassine, Shojafar, Mohammad, Alazab, Mamoun, Baddi, Youssef |
building |
Library A |
collection |
sid-183-col-kxpbbi |
ctrlnum |
(DE-627)1755520131, (DE-599)BVBBV047104542, (DE-604)BV047104542 |
dewey-full |
620.00285 |
dewey-hundreds |
600 - Technology (Applied sciences) |
dewey-ones |
620 - Engineering and allied operations |
dewey-raw |
620.00285 |
dewey-search |
620.00285 |
dewey-sort |
3620.00285 |
dewey-tens |
620 - Engineering and allied operations |
facet_avail |
Local |
facet_local_del330 |
Big Data, Computersicherheit, Datenanalyse |
finc_class_facet |
Informatik, Technik |
fincclass_txtF_mv |
science-computerscience, engineering-process, technology |
footnote |
Titelaufnahme entstanden auf Grundlage der Online-Ausgabe |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
hierarchy_parent_id |
183-498966216 |
hierarchy_parent_title |
Studies in computational intelligence |
hierarchy_sequence |
919 |
hierarchy_top_id |
183-498966216 |
hierarchy_top_title |
Studies in computational intelligence |
id |
183-1755520131 |
illustrated |
Not Illustrated |
imprint |
Cham, Springer, 2021 |
imprint_str_mv |
Cham: Springer, 2021 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
183-1755520131 |
is_hierarchy_title |
Machine intelligence and big data analytics for cybersecurity applications |
isbn |
9783030570231 |
isbn_isn_mv |
9783030570248, 978-3-030-57024-8 |
issn_isn_mv |
1860-949X |
language |
English |
last_indexed |
2024-05-22T22:57:20.595Z |
marc_error |
[geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @63d9bba |
match_str |
maleh2021machineintelligenceandbigdataanalyticsforcybersecurityapplications |
mega_collection |
K10plus Verbundkatalog |
multipart_link |
117828025 |
multipart_part |
(117828025)volume 919 |
physical |
xiii, 539 Seiten; Illustrationen, Diagramme (überwiegend farbig) |
publishDate |
2021 |
publishDateSort |
2021 |
publishPlace |
Cham |
publisher |
Springer |
record_format |
marcfinc |
record_id |
1755520131 |
recordtype |
marcfinc |
rvk_facet |
ST 300 |
rvk_label |
Informatik, Monografien, Künstliche Intelligenz, Allgemeines |
rvk_path |
ST, SQ - SU, ST 300, ST 300 - ST 308 |
rvk_path_str_mv |
ST, SQ - SU, ST 300, ST 300 - ST 308 |
series |
Studies in computational intelligence, volume 919 |
series2 |
Studies in computational intelligence ; volume 919 |
source_id |
183 |
spelling |
Maleh, Yassine 1987- HerausgeberIn (DE-588)1190215594 (DE-627)1668913240 edt, Machine intelligence and big data analytics for cybersecurity applications Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi, editors, Cham Springer 2021, xiii, 539 Seiten Illustrationen, Diagramme (überwiegend farbig), Text txt rdacontent, ohne Hilfsmittel zu benutzen n rdamedia, Band nc rdacarrier, Studies in computational intelligence volume 919, Titelaufnahme entstanden auf Grundlage der Online-Ausgabe, s (DE-588)4802620-7 (DE-627)472310364 (DE-576)216543657 Big Data gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4123037-1 (DE-627)105758051 (DE-576)209556331 Datenanalyse gnd, (DE-627), Shojafar, Mohammad HerausgeberIn edt, Alazab, Mamoun HerausgeberIn edt, Baddi, Youssef HerausgeberIn edt, 9783030570248, Erscheint auch als Online-Ausgabe 978-3-030-57024-8, Studies in computational intelligence volume 919 919 (DE-627)498966216 (DE-576)117828025 (DE-600)2202445-1 1860-949X ns, https://www.gbv.de/dms/tib-ub-hannover/1755520131.pdf V:DE-601 B:DE-89 pdf/application Inhaltsverzeichnis |
spellingShingle |
Machine intelligence and big data analytics for cybersecurity applications, Studies in computational intelligence, volume 919, Big Data, Computersicherheit, Datenanalyse |
title |
Machine intelligence and big data analytics for cybersecurity applications |
title_auth |
Machine intelligence and big data analytics for cybersecurity applications |
title_full |
Machine intelligence and big data analytics for cybersecurity applications Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi, editors |
title_fullStr |
Machine intelligence and big data analytics for cybersecurity applications Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi, editors |
title_full_unstemmed |
Machine intelligence and big data analytics for cybersecurity applications Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi, editors |
title_in_hierarchy |
volume 919. Machine intelligence and big data analytics for cybersecurity applications (2021) |
title_short |
Machine intelligence and big data analytics for cybersecurity applications |
title_sort |
machine intelligence and big data analytics for cybersecurity applications |
title_unstemmed |
Machine intelligence and big data analytics for cybersecurity applications |
topic |
Big Data, Computersicherheit, Datenanalyse |
topic_facet |
Big Data, Computersicherheit, Datenanalyse |
url |
https://www.gbv.de/dms/tib-ub-hannover/1755520131.pdf |
work_keys_str_mv |
AT malehyassine machineintelligenceandbigdataanalyticsforcybersecurityapplications, AT shojafarmohammad machineintelligenceandbigdataanalyticsforcybersecurityapplications, AT alazabmamoun machineintelligenceandbigdataanalyticsforcybersecurityapplications, AT baddiyoussef machineintelligenceandbigdataanalyticsforcybersecurityapplications |