Computer Security Threats
This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of comp...
Saved in:
Other Authors: | , , |
---|---|
Format: | Book Chapter |
Published: |
IntechOpen
2020
|
Subjects: | |
Online Access: | Get Fullteks DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02220naaaa2200349uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_67677 | ||
005 | 20210420 | ||
020 | |a intechopen.83233 | ||
020 | |a 9781838802400 | ||
020 | |a 9781838802394 | ||
020 | |a 9781839623813 | ||
024 | 7 | |a 10.5772/intechopen.83233 |c doi | |
041 | 0 | |a English | |
042 | |a dc | ||
072 | 7 | |a UT |2 bicssc | |
100 | 1 | |a Thomas, Ciza |4 edt | |
700 | 1 | |a Fraga-Lamas, Paula |4 edt | |
700 | 1 | |a Fernández-Caramés, Tiago M. |4 edt | |
700 | 1 | |a Thomas, Ciza |4 oth | |
700 | 1 | |a Fraga-Lamas, Paula |4 oth | |
700 | 1 | |a Fernández-Caramés, Tiago M. |4 oth | |
245 | 1 | 0 | |a Computer Security Threats |
260 | |b IntechOpen |c 2020 | ||
300 | |a 1 electronic resource (130 p.) | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer networking & communications |2 bicssc | |
653 | |a Cloud computing | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/9234/authors_book/authors_book.pdf |7 0 |z Get Fullteks |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/67677 |7 0 |z DOAB: description of the publication |