| 000 | 02114nam a2200421 i 4500 | ||
|---|---|---|---|
| 005 | 20250919010850.0 | ||
| 008 | 160314s20162016paua b 001 0 eng | ||
| 020 |
_a9781466694262 _qhardback _cRM823.93 |
||
| 039 | 9 |
_a201610101247 _bhaiyati _c201610051536 _dbaiti _c201609190900 _dzabidah _c201603210959 _dzabidah _y03-14-2016 _zzabidah |
|
| 040 |
_aDLC _beng _cDLC _erda _dDLC _dUKM _erda |
||
| 090 | _aQ342.I473 3 | ||
| 090 |
_aQ342 _b.I473 3 |
||
| 245 | 0 | 0 |
_aImproving information security practices through computational intelligence / _cWasan Shaker Awad, El Sayed M. El-Alfy, Yousif Al-Bastaki. |
| 264 | 1 |
_aHershey, PA : _bInformation Science Reference, _c[2016]. |
|
| 264 | 4 | _c©2016. | |
| 300 |
_axviii, 327 pages : _billustrations ; _c29 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 490 | 0 |
_aAdvances in information security, privacy, and ethics (AISPE) book series, _x1948-9730 |
|
| 490 | 0 | _aPremier reference source | |
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a'This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering'-- _cProvided by publisher. |
||
| 650 | 0 | _aComputational intelligence. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aData protection. | |
| 700 | 1 |
_aAwad, Wasan Shaker, _d1969-, _eeditor. |
|
| 700 | 1 |
_aEl-Alfy, El Sayed M., _d1968-, _eeditor. |
|
| 700 | 1 |
_aAl-Bastaki, Yousif A. Latif, _eeditor. |
|
| 907 |
_a.b16288543 _b2019-11-12 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kQ342.I473 3 |
||
| 914 | _avtls003602073 | ||
| 990 | _abety | ||
| 991 | _aFakulti Teknologi dan Sains Maklumat | ||
| 998 |
_al _b2016-01-03 _cm _da _feng _gpau _y0 _z.b16288543 |
||
| 999 |
_c606435 _d606435 |
||