Vorliegende Sprache |
eng |
Hinweise auf parallele Ausgaben |
423480677 Druckausg.: ‡Bio-inspiring cyber security and cloud services |
ISBN |
978-3-662-43615-8 |
Name |
Hassanien, Aboul Ella |
Kim, Tai-Hoon ¬[Hrsg.]¬ |
Name ANZEIGE DER KETTE |
Kim, Tai-Hoon ¬[Hrsg.]¬ |
Name |
Kacprzyk, Janusz ¬[Hrsg.]¬ |
Awad, Ali Ismail ¬[Hrsg.]¬ |
T I T E L |
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations |
Verlagsort |
Berlin, Heidelberg ; s.l. |
Verlag |
Springer Berlin Heidelberg |
Erscheinungsjahr |
2014 |
2014 |
Umfang |
Online-Ressource (XXII, 585 p. 235 illus., 17 illus. in color, online resource) |
Reihe |
Intelligent Systems Reference Library ; 70 |
Notiz / Fußnoten |
Description based upon print version of record |
Weiterer Inhalt |
Bio-Inspiring in Complex Network SecurityMobile Ad Hoc networks and Key managements -- Biometrics technology and applications. |
Titelhinweis |
Druckausg.: ‡Bio-inspiring cyber security and cloud services |
ISBN |
ISBN 978-3-662-43616-5 |
Klassifikation |
UYQ |
COM004000 |
006.3 |
Q342 |
ST 277 |
Kurzbeschreibung |
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cuttingedge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility. |
2. Kurzbeschreibung |
This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting-edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility. |
1. Schlagwortkette |
Cyberspace |
Computersicherheit |
Soft Computing |
Biometrie |
Aufsatzsammlung |
1. Schlagwortkette ANZEIGE DER KETTE |
Cyberspace -- Computersicherheit -- Soft Computing -- Biometrie -- Aufsatzsammlung |
2. Schlagwortkette |
Cloud Computing |
Datensicherung |
Trusted Computing |
SWB-Titel-Idn |
409580449 |
Signatur |
Springer E-Book |
Bemerkungen |
Elektronischer Volltext - Campuslizenz |
Elektronische Adresse |
$uhttp://dx.doi.org/10.1007/978-3-662-43616-5 |
Internetseite / Link |
Volltext |
Siehe auch |
Volltext |
Siehe auch |
Cover |