NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cyber security and digital forensics / (Record no. 12860)

MARC details
000 -LEADER
fixed length control field 05012cam a2200505 i 4500
001 - CONTROL NUMBER
control field on1292744255
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125543.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220120s2022 nju ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DG1
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency DG1
Modifying agency OCLCO
-- OCLCF
-- OCLCO
-- YDX
-- OCLCQ
-- UPM
-- OCLCQ
-- WSU
-- OCLCO
-- OCLCL
-- OCLCQ
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119795667
Qualifying information (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119795664
Qualifying information (electronic bk. : oBook)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119795667
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000070667753
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1292744255
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 00 - TITLE STATEMENT
Title Cyber security and digital forensics /
Statement of responsibility, etc. edited by Mangesh M. Ghonge [and more].
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Wiley ;
Place of production, publication, distribution, manufacture Beverly, MA :
Name of producer, publisher, distributor, manufacturer Scrivener Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Advances in cyber security
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note A Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture / Ankur O Bang, Udai Pratap Rao, Amit A Bhusari -- Quantum and Post-Quantum Cryptography / Om Pal, Manoj Jain, BK Murthy, Vinay Thakur -- Artificial Neural Network Applications in Analysis of Forensic Science / KR Padma, KR Don -- A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications / Rashmi Salavi, M M Math, U P Kulkarni -- Understanding Robotics through Synthetic Psychology / Garima Saini, Shabnam -- An Insight into Digital Forensics: History, Frameworks, Types and Tools / G Maria Jones, S Godfrey Winster -- Digital Forensics as a Service: Analysis for Forensic Knowledge / Soumi Banerjee, Anita Patil, Dipti Jadhav, Gautam Borkar -- 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework / Neel A Patel, Dhairya A Parekh, Yash A Shah, Ramchandra Mangrulkar -- Ensuring Secure Data Sharing in IoT Domains Using Blockchain / Tawseef Ahmed Teli, Rameez Yousuf, Dawood Ashraf Khan -- A Review of Face Analysis Techniques for Conventional and Forensic Applications / HT Chethana, Trisiladevi C Nagavi -- Roadmap of Digital Forensics Investigation Process with Discovery of Tools / Anita Patil, Soumi Banerjee, Dipti Jadhav, Gautam Borkar -- Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach / Kaushik Dushyant, Garg Muskan, Annu, Ankur Gupta, Sabyasachi Pramanik -- Applications of Machine Learning Techniques in the Realm of Cybersecurity / Koushal Kumar, Bhagwati Prasad Pande -- Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control-Data Acquisition (SCADA) Using Blockchain at Dark Web Platform / Anand Singh Rajawat, Romil Rawat, Kanishk Barhanpurkar -- Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications / Tun Myat Aung, Ni Ni Hla -- Ransomware: Threats, Identification and Prevention / Sweta Thakur, Sangita Chaudhari, Bharti Joshi.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (John Wiley, viewed January 20, 2022).
520 ## - SUMMARY, ETC.
Summary, etc. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Digital forensic science.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Security
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Digital forensic science
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ghonge, Mangesh,
Dates associated with a name 1984-
Relator term editor.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Cyber security and digital forensics (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCFv4FQQVPGDXjYbVKFHxj3
Relationship https://id.oclc.org/worldcat/ontology/hasWork
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in cyber security.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a>
938 ## -
-- YBP Library Services
-- YANK
-- 302666478
994 ## -
-- 92
-- INLUM

No items available.