LIBRARY CATALOGUE
Knowledge • Research • Discovery
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Computational intelligence in information assurance and security / Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle editors

Contributor(s): Material type: TextSeries: Studies in computational intelligence ; v. 57 | Studies in computational intelligence ; v. 57.Publisher: Berlin : Springer, 2007Copyright date: ©2007Description: xx, 254 pages : illustrationsContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9783540710776
Subject(s): DDC classification:
  • 23 006.3 NED
Summary: The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for p.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Gifted Books Sai University Library General stacks 006.3 NED (Browse shelf(Opens below)) Available G3025

Gifted by Professor Ajith Abraham

Includes bibliographical references and author index

The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. This volume provides the academic and industrial community with a medium for p.

There are no comments on this title.

to post a comment.
Copyright © 2026 – Sai University Library