MARC details
000 -LEADER |
fixed length control field |
03413cam a22003858i 4500 |
001 - CONTROL NUMBER |
control field |
22253264 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
KENaKMTC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20211104120514.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210828s2022 flu b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2021036513 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367686505 |
Qualifying information |
(hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367690137 |
Qualifying information |
(paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781003140023 |
Qualifying information |
(ebook) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
LBSOR/DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
A354 2022 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23/eng/20211007 |
245 00 - TITLE STATEMENT |
Title |
Advanced smart computing technologies in cybersecurity and forensics / |
Statement of responsibility, etc |
edited by Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, and Manoj Kumar. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
2201 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
pages cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Detection of cross site scripting and phishing website vulnerabilities using machine learning / Sunil Sikka, Charu Jain, Aarti Chugh -- A review : security and privacy defensive techniques for cyber security using deep neural networks (DNNs) / Prachi Chauhan, Hardwari Lal Mandoria, Alok Negi -- DNA-based cryptosystem for connected objects and IoT security / Belhorma Brahim, Bouhedda Mounir, Bengherbia Billel, Benzineb Omar -- A role of digital evidence : mobile forensics data / G Maria Jones, S Godfrey Winster, L Ancy Geoferla -- Analysis of kernel vulnerabilities using machine learning / Supriya Raheja, Rakesh Garg, Bhavya Gururani -- Cyber threat exploitation and growth during Covid-19 times / Romil Rawat, Anand Singh Rajawat, Vinod Mahor, Bhagwati Garg -- An overview of the cybersecurity in smart cities in the modern digital age / Reinaldo Padilha, Ana Carolina Borges Monteiro -- The fundamentals and potential for cyber security of machine learning in the modern world / Reinaldo Padilha, Ana Carolina Borges Monteiro -- Qualitative and quantitative evaluation of encryption algorithms / Supriya Raheja, Rakesh Garg, Durgesh Pandey -- Analysis and investigation of advanced malware forensics / Apirajitha P. S., Punitha S, Thompson Stephan -- Network intrusion detection system using naïve Bayes classification technique for anomaly detection / Sam Goundar, Manveer Singh, Rahul Chand, Akashdeep Bhardwaj -- Data security analysis in mobile cloud computing for cyber security / Sam Goundar, Akashdeep Bhardwaj -- A critical review of legal and technical challenges during preliminary investigations of suspects of cyber crimes / Joshua Nehinbe -- Fault analysis techniques in lightweight ciphers for IoT devices / Priyanka Joshi, Bodhisatwa Mazumdar. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"This book addresses the topics related to artificial intelligence, internet of things, blockchain technology, and machine learning and brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Investigation. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kaushik, Keshav, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Tayal, Shubham, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Bhardwaj, Akashdeep, |
Dates associated with a name |
1971- |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kumar, Manoj |
Titles and other words associated with a name |
(Professor of computer science), |
Relator term |
editor. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Online version: |
Title |
Advanced smart computing technologies in cybersecurity and forensics. |
Edition |
First edition |
Place, publisher, and date of publication |
Boca Raton : CRC Press, 2022 |
International Standard Book Number |
9781003140023 |
Record control number |
(DLC) 2021036514 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |
Intials |
am |