Cybersecurity in intelligent networking systems / (Record no. 31157)

MARC details
000 -LEADER
fixed length control field 03131nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260126141505.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260126b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119784135
024 ## - OTHER STANDARD IDENTIFIER
Source of number or code doi
Standard number or code 10.1002/9781119784135
040 ## - CATALOGING SOURCE
Original cataloging agency TUPM
Language of cataloging eng
Transcribing agency TUPM
Modifying agency TUPM
Description conventions rda
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Qian, Yi.
Relator term author
245 ## - TITLE STATEMENT
Title Cybersecurity in intelligent networking systems /
Statement of responsibility, etc. Yi Qian and 2 others.
Medium ebook
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. John Wiley & Sons, Ltd,
Date of publication, distribution, etc. 2023.
336 ## - CONTENT TYPE
Source rdacontent
337 ## - MEDIA TYPE
Source rdamedia
338 ## - CARRIER TYPE
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographic references and index.
520 ## - SUMMARY, ETC.
Summary, etc. Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social networks, and other major cyber applications—it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy.<br/><br/>Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology.<br/><br/>Cybersecurity in Intelligent Networking Systems readers will also find:<br/>- Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats<br/>- Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption<br/>- Key areas in adversarial machine learning, from both offense and defense perspectives<br/>- Descriptions of network anomalies and cyber threats<br/>- Background information on data-driven network intelligence for cybersecurity<br/>- Robust and secure edge intelligence for network anomaly detection against cyber intrusions<br/>- Detailed descriptions of the design of privacy-preserving security protocols<br/><br/>Cybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cybersecurity
Form subdivision eBook
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Artificial intelligence
General subdivision Cybersecurity
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Hu, Rose Qingyang.
Relator term author
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Xu, Shengjie.
Relator term author
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135</a>
Link text Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBook
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total checkouts Date last seen Uniform resource identifier Price effective from Koha item type
    Library of Congress Classification     TUP Manila Library TUP Manila Library 01/26/2026   01/26/2026 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119784135 01/26/2026 eBook



© 2025 Technological University of the Philippines.
All Rights Reserved.

Powered by Koha