| Tag |
First Indicator |
Second Indicator |
Subfields |
| LEADER |
00000nam a2200000Mi 4500 |
| 001 |
in00004790621 |
| 003 |
OCoLC |
| 005 |
20240513122412.6 |
| 006 |
m o d |
| 007 |
cr cnu---unuuu |
| 008 |
240410s2024 pau fob 001 0 eng d |
| 024 |
8 |
|
|a 40032280546
|
| 040 |
|
|
|a IGIGL
|b eng
|e rda
|c IGIGL
|d OCLCO
|d OCLKB
|d OCLCQ
|d IGIGL
|d YDX
|
| 019 |
|
|
|a 1402484430
|
| 020 |
|
|
|a 9798369307670
|q electronic book
|
| 020 |
|
|
|z 9798369307663
|q print
|
| 035 |
|
|
|a (OCoLC)1429862736
|z (OCoLC)1402484430
|
| 050 |
|
4 |
|a QA76.585
|b .E44 2024
|
| 082 |
0 |
4 |
|a 004.67/82
|2 23
|
| 245 |
0 |
0 |
|a Emerging technologies for securing the cloud and IoT /
|c [edited by] Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem.
|
| 246 |
3 |
|
|a Emerging technologies for securing the cloud and internet of things
|
| 264 |
|
1 |
|a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
|b Information Science Reference (an imprint of IGI Global),
|c [2024]
|
| 300 |
|
|
|a 1 online resource ( 21 PDFs 361 pages.) :
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 490 |
1 |
|
|a Advances in information security, privacy, and ethics (AISPE) book series
|
| 500 |
|
|
|a "Premier reference source"--Cover.
|
| 504 |
|
|
|a Includes bibliographical references and index.
|
| 505 |
0 |
|
|a Chapter 1. Smart applications based on IoT: challenges and emerging trends landscape -- Chapter 2. A review of artificial intelligence techniques for improved cloud and IoT security -- Chapter 3. Deep learning for IoT security: applications and challenges -- Chapter 4. Recent developments of semantic web: technologies and challenges -- Chapter 5. Development of artificial intelligence of things and cloud computing environments through semantic web control models -- Chapter 6. Privacy-preserving machine learning techniques for IoT data in cloud environments -- Chapter 7. Chatgpt and ensemble learning for mobile text misinformation identification -- Chapter 8. Analyzing the efficacy of machine learning algorithms on intrusion detection systems -- Chapter 9. Secure communication protocols for cloud and IoT: a comprehensive review -- Chapter 10. Landscape of serverless computing technology and IoT tools in the IT sectors -- Chapter 11. Enhancing cloud and IoT security: leveraging IoT technology for multi-factor user authentication -- Chapter 12. SISA en-decryption algorithm for multilingual data privacy and security in IoT.
|
| 588 |
|
|
|a Description based on online resource; title from digital title page (viewed on May 13, 2024).
|
| 650 |
|
0 |
|a Internet of things.
|
| 650 |
|
0 |
|a Cloud computing.
|
| 650 |
|
0 |
|a Blockchains (Databases)
|
| 650 |
|
6 |
|a Internet des objets.
|0 (CaQQLa)000269177
|
| 650 |
|
6 |
|a Chaînes de blocs.
|0 (CaQQLa)000300319
|
| 655 |
|
7 |
|a Electronic books.
|2 local
|
| 700 |
1 |
|
|a Nacer, Amina Ahmed,
|e editor.
|
| 700 |
1 |
|
|a Abdmeziem, Mohammed Riyadh,
|e editor.
|
| 710 |
2 |
|
|a IGI Global Online
|p MaRLi Oxford UPSO 2024 Collection.
|
| 776 |
1 |
8 |
|i Print version:
|z 9798369307663
|
| 830 |
|
0 |
|a Advances in information security, privacy, and ethics (AISPE) book series.
|
| 856 |
4 |
0 |
|u http://proxy.library.tamu.edu/login?url=https://dx.doi.org/10.4018/979-8-3693-0766-3
|z Connect to the full text of this electronic book
|t 0
|
| 945 |
|
|
|b 72039
|
| 955 |
|
|
|a YBP purchased approval e-records
|
| 980 |
|
|
|b ebook
|c 40032280546
|f NONFIC/B
|g 565751
|k USD
|m 220.00
|q 1
|s AcqMono Conventional
|t Approval plan
|u Vendor order reference number
|v ZYBP
|y E-approvals
|z Electronic resource
|
| 999 |
f |
f |
|i e8494fd0-90b1-465d-b6e4-8bce3cd4de58
|s 2279eb31-7969-4c29-9061-4c380d25959a
|t 0
|
| 952 |
f |
f |
|a Texas A&M University
|b College Station
|c Electronic Resources
|s www_evans
|d Available Online
|t 0
|e QA76.585 .E44 2024
|h Library of Congress classification
|