MARC

Tag First Indicator Second Indicator Subfields
LEADER 00000cam a2200000 i 4500
001 in00005658021
006 m o d
007 cr cnu---unuuu
008 241228s2025 paua ob 000 1 eng
005 20250810205613.9
010 |a  2024052919 
035 |a (OCoLC)on1479494480 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLKB  |d UIU  |d IGIGL  |d OCLCQ  |d OCLCO  |d YDX 
019 |a 1464358440 
020 |a 9798369375426 (electronic bk.) 
020 |z 9798369375402  |q hardcover 
020 |z 9798369375419  |q paperback 
024 7 |a 10.4018/979-8-3693-7540-2  |2 doi 
035 |a (OCoLC)1479494480  |z (OCoLC)1464358440 
042 |a pcc 
050 0 0 |a QA76.9.A25  |b M3133 2025 
082 0 0 |a 006.3/1  |2 23/eng/20250102 
245 0 0 |a Machine intelligence applications in cyber-risk management /  |c [edited by] Mohammed Almaiah, Yassine Maleh. 
264 1 |a Hershey, PA :  |b IGI Global,  |c [2025] 
300 |a 1 online resource (xvii, 492 pages) :  |b illustrations (chiefly color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in computational intelligence and robotics (ACIR) book series 
500 |a Series title from publisher's website. 
504 |a Includes bibliographical references and index. 
520 |a "This book delves into the transformative impact of these technologies in safeguarding organizations against an evolving landscape of cybersecurity threats"--  |c Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on February 06, 2025). 
650 0 |a Computer security  |x Technological innovations. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Machine learning  |x Industrial applications. 
650 0 |a Artificial intelligence  |x Industrial applications. 
650 6 |a Sécurité informatique  |0 (CaQQLa)201-0061152  |x Innovations.  |0 (CaQQLa)201-0379286 
650 6 |a Apprentissage automatique  |0 (CaQQLa)201-0131435  |x Applications industrielles.  |0 (CaQQLa)201-0374039 
650 6 |a Intelligence artificielle  |0 (CaQQLa)201-0008626  |x Applications industrielles.  |0 (CaQQLa)201-0374039 
653 |a Anomaly Detection Algorithms. 
653 |a Artificial Intelligence (AI) 
653 |a Cyber-Risk Management. 
653 |a Cybersecurity. 
653 |a Deep Learning. 
653 |a Drone Security. 
653 |a Internet of Things (IoT) 
653 |a Intrusion Detection. 
653 |a Machine Intelligence. 
653 |a Machine Learning (ML) 
653 |a Malware Detection. 
653 |a Network Security. 
653 |a Terrorism. 
653 |a Threat Detection. 
653 |a Wireless Sensor Networks (WSNs) 
700 1 |a Almaiah, Mohammed Amin,  |d 1986-  |e editor. 
700 1 |a Maleh, Yassine,  |d 1987-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjwxcfTJMmgYPcPC7cGCgq 
776 0 8 |i Print version:  |t Machine intelligence applications in cyber-risk management  |d Hershey PA : IGI Global, [2025]  |z 9798369375402  |w (DLC) 2024052918 
830 0 |a Advances in computational intelligence and robotics (ACIR) book series. 
852 8 |b POD  |z This title is available for the library to purchase for your use. Click the "Purchase It For Me" button to place a request. This item will take 5-10 business days to arrive. 
955 |a Ebook POD title 
961 |m 565731 
999 f f |s 05f6e8db-b459-4c68-88cd-21fe81f4d463  |i 97694b91-4070-40ca-a2d2-6b268f608fdc  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Sterling C. Evans Library  |d Purchase on Demand  |t 0  |e QA76.9.A25 M3133 2025  |h Library of Congress classification 
998 f f |a QA76.9.A25 M3133 2025  |t 0  |l Purchase on Demand