Computer Security Threats

This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of comp...

Full description

Saved in:
Bibliographic Details
Other Authors: Thomas, Ciza (Editor), Fraga-Lamas, Paula (Editor), Fernández-Caramés, Tiago M. (Editor)
Format: Electronic Book Chapter
Language:English
Published: IntechOpen 2020
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_67677
005 20210420
003 oapen
006 m o d
007 cr|mn|---annan
008 20210420s2020 xx |||||o ||| 0|eng d
020 |a intechopen.83233 
020 |a 9781838802400 
020 |a 9781838802394 
020 |a 9781839623813 
040 |a oapen  |c oapen 
024 7 |a 10.5772/intechopen.83233  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UT  |2 bicssc 
100 1 |a Thomas, Ciza  |4 edt 
700 1 |a Fraga-Lamas, Paula  |4 edt 
700 1 |a Fernández-Caramés, Tiago M.  |4 edt 
700 1 |a Thomas, Ciza  |4 oth 
700 1 |a Fraga-Lamas, Paula  |4 oth 
700 1 |a Fernández-Caramés, Tiago M.  |4 oth 
245 1 0 |a Computer Security Threats 
260 |b IntechOpen  |c 2020 
300 |a 1 electronic resource (130 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Computer networking & communications  |2 bicssc 
653 |a Cloud computing 
856 4 0 |a www.oapen.org  |u https://mts.intechopen.com/storage/books/9234/authors_book/authors_book.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/67677  |7 0  |z DOAB: description of the publication