Intelligent security systems : (Record no. 69650)

000 -LEADER
fixed length control field 03613cam a22006018i 4500
001 - CONTROL NUMBER
control field on1273050376
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203723.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210914s2022 nju o 001 0 eng
019 ## -
-- 1273426075
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119771579
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119771579
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119771562
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119771560
-- (epub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119771555
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119771552
-- (adobe pdf)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (hardback)
037 ## -
-- 9562694
-- IEEE
082 00 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Reznik, Leonid,
245 10 - TITLE STATEMENT
Title Intelligent security systems :
Sub Title how artificial intelligence, machine learning and data science work for and against computer security /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Computer Security with Artificial Intelligence, Machine Learning, and Data Science Combination -- Firewall Design and Implementation -- Intrusion Detection Systems -- Malware and Vulnerabilities Detection and Protection -- Hackers versus Normal Users -- Adversarial Machine Learning.
500 ## - GENERAL NOTE
Remark 1 Includes index.
520 ## - SUMMARY, ETC.
Summary, etc "Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."--
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119771579
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- Wiley-IEEE Press,
-- [2022]
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- Description based on print version record and CIP data provided by publisher; resource not viewed.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
-- (OCoLC)fst00817247
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
-- (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Machine learning.
-- (OCoLC)fst01004795
994 ## -
-- 92
-- DG1

No items available.