MARC details
000 -LEADER |
fixed length control field |
03569cam a2200337 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250423103540.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240219s2023 flua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781003323426 (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781032081663 (hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781032347028 (paperback) |
037 ## - SOURCE OF ACQUISITION |
Source of stock number/acquisition |
SBF2023 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
-- |
AE-Shu |
Transcribing agency |
UKB |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5103.2 |
Item number |
.C654 2023 |
245 00 - TITLE STATEMENT |
Title |
Computational intelligent security in wireless communications / |
Statement of responsibility, etc. |
edited by Suhel Ahmad Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 264 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
550.00 |
Currency code |
AED |
490 0# - SERIES STATEMENT |
Series statement |
Wireless communications and networking technologies : classifications advancement and application series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
An investigation on Cooperative Communication Techniques in Mobile Ad Hoc Networks / Prasannavenkatesan Theerthagiri -- IoE Based Genetic Algorithms and its Requisition / Neeraj Kumar Rathore, Shubhangi Pande -- A Framework for Hybrid WBSN-VANET based Health Monitoring System / Pawan Singh, Ram Shringar Raw, Dac-Nhuong Le -- Managing IoT -Cloud based Security: Needs and Importance / Sarita Shukla, Vanshita Gupta, Abhishek Kumar Pandey, Rajat Sharma, Yogesh Pal, Bineet Kumar Gupta, Alka Agrawal -- Predictive Maintenance in Industry 4.0 / Manoj Devare -- Fast and Efficient Lightweight Block Cipher Involving 2d-Key Vector for Resource Poor Setting / Shirisha Kakarla, Geeta Kakarla, D. Narsinga Rao and M. Raghavender Sharma -- Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in cloud environment / Mahboob Alam, Mohd Amjad and Mohd. Naseem -- The UAV Assisted Wireless Ad Hoc Network / Mohd Asim Sayeed, Raj Shree, Mohd Waris Khan -- Integrating Cybernetics into Healthcare System: Security Perspective / Saquib Ali, Jalaluddin Khan, Jian Ping Li, Masood Ahmad, Kanika Sharma, Amal Krishna Sarkar, Alka Agrawal, Ranjit Rajak -- Threats and Countermeasures in Digital Crime and Cyber Terrorism / Mohit Kumar, Ram Shringar Raw, Bharti Nagpal -- Cryptography Techniques for Information Security: A Review / Ganesh Chandra, Satya Bhushan Verma, Abhay Kumar Yadav -- A Critical Analysis of Cyber Threats and Its Global Impact / Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello -- A Cyber security Perspective of Machine Learning Algorithms / Adil Hussain Seh, Hagos Yirgaw, Masood Ahmad, Mohd Faizan, Nitish Pathak, Majid Zaman, Alka Agrawal -- Statistical Trend in Cyber Attacks and Security Measures Adopted in Healthcare Sector Shirisha Kakarla, D. Narsinga Rao, Geeta Kakarla, Srilatha Gorla. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This book cover data processing, engineering, forensics, computer science and information technology in perspective of wireless communication. It will an ideal text for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless communication systems |
General subdivision |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computational intelligence |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Khan, Suhel Ahmad, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kumar, Rajeev, |
Dates associated with a name |
1991- |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kaiwartya, Omprakash, |
Dates associated with a name |
1981- |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Khan, R. A. |
Fuller form of name |
(Raees Ahmad), |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Faisal, Mohammad |
Titles and other words associated with a name |
(Professor of computer application), |
Relator term |
editor. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
Source of classification or shelving scheme |
lcc |
Suppress in OPAC |
No |