Computational intelligent security in wireless communications / (Record no. 19006)

MARC details
000 -LEADER
fixed length control field 03569cam a2200337 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250423103540.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240219s2023 flua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003323426 (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032081663 (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032347028 (paperback)
037 ## - SOURCE OF ACQUISITION
Source of stock number/acquisition SBF2023
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
-- AE-Shu
Transcribing agency UKB
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5103.2
Item number .C654 2023
245 00 - TITLE STATEMENT
Title Computational intelligent security in wireless communications /
Statement of responsibility, etc. edited by Suhel Ahmad Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. 2023.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 264 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount 550.00
Currency code AED
490 0# - SERIES STATEMENT
Series statement Wireless communications and networking technologies : classifications advancement and application series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks / Prasannavenkatesan Theerthagiri -- IoE Based Genetic Algorithms and its Requisition / Neeraj Kumar Rathore, Shubhangi Pande -- A Framework for Hybrid WBSN-VANET based Health Monitoring System / Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le -- Managing IoT -Cloud based Security: Needs and Importance / Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal -- Predictive Maintenance in Industry 4.0 / Manoj Devare -- Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting / Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma -- Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment / Mahboob Alam, Mohd Amjad and Mohd. Naseem -- The UAV Assisted Wireless Ad Hoc Network / Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan -- Integrating Cybernetics into Healthcare System: Security Perspective / Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak -- Threats and Countermeasures in Digital Crime and Cyber Terrorism / Mohit Kumar, Ram Shringar Raw, Bharti Nagpal -- Cryptography Techniques for Information Security: A Review / Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav -- A Critical Analysis of Cyber Threats and Its Global Impact / Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello -- A Cyber security Perspective of Machine Learning Algorithms / Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal -- Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla.
520 ## - SUMMARY, ETC.
Summary, etc. "This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless communication systems
General subdivision Security measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computational intelligence
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Khan, Suhel Ahmad,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Rajeev,
Dates associated with a name 1991-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kaiwartya, Omprakash,
Dates associated with a name 1981-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Khan, R. A.
Fuller form of name (Raees Ahmad),
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Faisal, Mohammad
Titles and other words associated with a name (Professor of computer application),
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme lcc
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Loanable University of Kalba University of Kalba 2019-02-24 SBF2023 i15654564   TK5103.2 .C654 2023 00-1-364832 2025-04-21 2025-04-21 Books

© 2025 University of Kalba. All Rights Reserved.