From 5G to 6G : (Record no. 92198)

000 -LEADER
fixed length control field 16635cam a2200433 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250828101125.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250828s2023 njum o u001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119883081
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119883098
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119883091
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 1119883083
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119883081
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119883104
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119883105
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1389339898
Canceled/invalid control number (OCoLC)1389341053
-- (OCoLC)1390571784
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5103.2
Item number .Y3657 2023
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Yarali, Abdulrahman,
Authority record control number https://id.loc.gov/authorities/names/n2015047667
Relator term author.
245 10 - TITLE STATEMENT
Title From 5G to 6G :
Remainder of title technologies, architecture, AI, and security /
Statement of responsibility, etc Abdulrahman Yarali.
246 3# - VARYING FORM OF TITLE
Title proper/short title From 5G to 6G :
Remainder of title technologies, architecture, artificial intelligence, and security.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken :
Name of publisher, distributor, etc Wiley, IEEE Press,
Date of publication, distribution, etc [2023]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>About the Author xiii<br/><br/>Preface xv<br/><br/>1 Technologies and Development for the Next Information Age 1<br/><br/>1.1 Introduction 1<br/><br/>1.2 Roadmap to 6G 1<br/><br/>1.2.1 Society 5.0 4<br/><br/>1.2.2 Extended Reality 4<br/><br/>1.2.3 Wireless Brain-Computer 5<br/><br/>1.2.4 Haptic Communication 5<br/><br/>1.2.5 Smart Healthcare 5<br/><br/>1.2.6 Five-Sense Information 6<br/><br/>1.2.7 The Internet of Everything 6<br/><br/>1.2.8 5G to 6G 6<br/><br/>1.3 AI and Cybersecurity: Paving the Way for the Future 10<br/><br/>1.4 Fusion of IoT, AI, and Cybersecurity 10<br/><br/>1.4.1 Where Did AI Begin? 12<br/><br/>1.4.2 Role of AI 12<br/><br/>1.4.3 Disadvantages of AI 12<br/><br/>1.4.4 Advantages of AI 12<br/><br/>1.4.5 Threats from Hackers 14<br/><br/>1.5 How AI Can Help Solve These Problems 15<br/><br/>1.6 Connected Devices and Cybersecurity 16<br/><br/>1.7 Solutions for Data Management in Cybersecurity 17<br/><br/>1.8 Conclusion 17<br/><br/>References 18<br/><br/>2 Networks of the Future 21<br/><br/>2.1 Introduction 21<br/><br/>2.2 The Motive for Energy-Efficient ICTs 22<br/><br/>2.2.1 Approaches 23<br/><br/>2.3 Wireless Networks 24<br/><br/>2.3.1 Wi-Fi 26<br/><br/>2.3.2 Lte 28<br/><br/>2.3.3 Heterogeneous Networks 29<br/><br/>2.3.4 Femtocell Repeater 29<br/><br/>2.3.5 The Dawn of 5G Wireless Systems 30<br/><br/>2.3.6 Advancing from 5G to 6G Networks 32<br/><br/>2.4 Cognitive Networking 33<br/><br/>2.4.1 Zero-Touch Network and Service Management 34<br/><br/>2.4.2 Zero-Trust Networking 35<br/><br/>2.4.3 Information-Centric Networking 35<br/><br/>2.4.3.1 Basic Concepts of ICN 36<br/><br/>2.4.4 In-Network Computing 36<br/><br/>2.4.5 Active Networking 36<br/><br/>2.5 Mobile Edge Computing 37<br/><br/>2.6 Quantum Communications 37<br/><br/>2.6.1 Quantum Computing and 6G Wireless 38<br/><br/>2.7 Cybersecurity of 6G 38<br/><br/>2.8 Massive Machine-Type Communications (MTC) 39<br/><br/>2.9 Edge-Intelligence and Pervasive Artificial Intelligence in 6G 40<br/><br/>2.10 Blockchain: Foundations and Role in 6G 40<br/><br/>2.11 Role of Open-Source Platforms in 6G 40<br/><br/>2.11.1 PHY Technologies for 6G Wireless 40<br/><br/>2.11.2 Reconfigurable Intelligent Surface for 6G Wireless Networks 41<br/><br/>2.11.3 Millimeter-Wave and Terahertz Spectrum for 6G Wireless 41<br/><br/>2.11.4 Challenges in Transport Layer for Terabit Communications 41<br/><br/>2.11.5 High-Capacity Backhaul Connectivity for 6G Wireless 42<br/><br/>2.11.6 Cloud-Native Approach for 6G Wireless Networks 42<br/><br/>2.11.7 Machine Type Communications in 6G 42<br/><br/>2.11.8 Impact of 5G and 6G on Health and Environment 42<br/><br/>2.12 Integration of 5G with AI and IoT and Roadmap to 6G 43<br/><br/>2.13 3gpp 47<br/><br/>2.14 Conclusion 49<br/><br/>References 49<br/><br/>3 The Future of Wireless Communication with 6G 53<br/><br/>3.1 Introduction 53<br/><br/>3.2 Recent Trends Leading to 6G Technology Evolution 53<br/><br/>3.3 Security and Privacy Challenges in 6G Wireless Communications 53<br/><br/>3.4 The Impact of 6G on Healthcare Systems 56<br/><br/>3.5 The Impact of 6G on Space Technology and Satellite Communication 58<br/><br/>3.6 The Impact of 6G on Other Industries 60<br/><br/>3.7 Terahertz Wireless Systems and Networks with 6G 61<br/><br/>3.8 The Future of 6G and Its Role in IT 62<br/><br/>References 62<br/><br/>4 Artificial Intelligence and Machine Learning in the Era of 5G and 6G Technology 65<br/><br/>4.1 Artificial Intelligence and Machine Learning: Definitions, Applications, and Challenges 66<br/><br/>4.1.1 Application of Machine Learning and Artificial Intelligence 66<br/><br/>4.1.2 Challenges for Machine Learning and Artificial Intelligence 66<br/><br/>4.2 Artificial Intelligence: Laws, Regulations, and Ethical Issues 67<br/><br/>4.2.1 Ethical Governance in Artificial Intelligence 67<br/><br/>4.2.2 The Future of Regulation for AI 67<br/><br/>4.3 Potentials of Artificial Intelligence in Wireless 5G and 6G: Benefits and Challenges 68<br/><br/>4.3.1 Artificial Intelligence in Wireless 5G and 6G 68<br/><br/>4.3.2 Benefits and Challenges of AI in 5G and 6G 68<br/><br/>4.3.3 How Can AI Be Used to Enhance 6G Wireless Security? 68<br/><br/>4.3.4 The 6G Era’s Edge Intelligence and Cloudification 69<br/><br/>4.3.5 Distributed Artificial Intelligence in 6G Security 69<br/><br/>4.4 Cybersecurity Issues in Advanced 5G and 6G 70<br/><br/>4.5 Benefits and Challenges of Using AI in Cybersecurity: Help or Hurt? 70<br/><br/>4.6 How Can AI Be Used by Hackers Attacking Networks? 71<br/><br/>4.7 Conclusion 72<br/><br/>References 72<br/><br/>5 6G Wireless Communication Systems: Emerging Technologies, Architectures, Challenges, and Opportunities 73<br/><br/>5.1 Introduction 73<br/><br/>5.2 Important Aspects of Sixth-Generation Communication Technology 73<br/><br/>5.2.1 A Much Higher Data Rate 74<br/><br/>5.2.2 A Much Lower Latency 74<br/><br/>5.2.3 Network Reliability and Accuracy 74<br/><br/>5.2.4 Energy Efficiency 74<br/><br/>5.2.5 Focus on Machines as Primary Users 74<br/><br/>5.2.6 AI Wireless Communication Tools 74<br/><br/>5.2.7 Personalized Network Experience 74<br/><br/>5.3 Enabling Technologies Behind the Drive for 6G 76<br/><br/>5.3.1 Artificial Intelligence 76<br/><br/>5.3.2 Terahertz Communications 78<br/><br/>5.3.3 Optical Wireless Technology 78<br/><br/>5.4 Extreme Performance Technologies in 6G Connectivity 79<br/><br/>5.4.1 Quantum Communication and Quantum ml 79<br/><br/>5.4.2 Blockchain 80<br/><br/>5.4.2.1 Internal Network Operations 80<br/><br/>5.4.2.2 Ecosystem for Productive Collaboration 80<br/><br/>5.4.2.3 Tactile Internet 80<br/><br/>5.4.2.4 Spectrum Sharing (FDSS) and Free Duplexing 80<br/><br/>5.5 6G Communications Using Intelligent Platforms 81<br/><br/>5.5.1 Integrated Intelligence 82<br/><br/>5.5.2 Satellite-Based Integrated Network 82<br/><br/>5.5.3 Wireless Information and Energy Transfer Are Seamlessly Integrated 83<br/><br/>5.6 Artificial Intelligence and a Data-Driven Approach to Networks 83<br/><br/>5.6.1 Zero-Touch Network 84<br/><br/>5.6.2 AI by Design 85<br/><br/>5.6.3 Technological Fundamentals for Zero-Touch Systems 85<br/><br/>5.7 Sensing for 6G 85<br/><br/>5.7.1 A Bandwidth as Well as Carrier Frequency Rise 85<br/><br/>5.7.2 Chip Technologies of the Future 86<br/><br/>5.7.3 Models of Consistent Channels 86<br/><br/>5.7.4 X-Haul and Transport Network for 6G 87<br/><br/>5.8 Applications 87<br/><br/>5.9 Innovative 6G Network Architectures 89<br/><br/>5.10 Conclusion 89<br/><br/>References 90<br/><br/>6 6G: Architecture, Applications, and Challenges 91<br/><br/>6.1 Introduction 91<br/><br/>6.2 6G Network Architecture Vision 93<br/><br/>6.2.1 6G Use Cases, Requirements, and Metrics 94<br/><br/>6.2.2 What 5G Is Currently Covering 95<br/><br/>6.3 6th Generation Networks: A Step Beyond 5G 97<br/><br/>6.3.1 6G and the Fundamental Features 98<br/><br/>6.4 Emerging Applications of 6G Wireless Networks 99<br/><br/>6.4.1 Virtual, Augmented, and Mixed Reality 99<br/><br/>6.4.2 Holographic Telepresence 100<br/><br/>6.4.3 Automation: The Future of Factories 101<br/><br/>6.4.4 Smart Lifestyle with the Integration of the Internet of Things 101<br/><br/>6.4.5 Autonomous Driving and Connected Devices 101<br/><br/>6.4.6 Healthcare 101<br/><br/>6.4.7 Nonterrestrial Communication 101<br/><br/>6.4.8 Underwater Communication 102<br/><br/>6.4.9 Disaster Management 102<br/><br/>6.4.10 Environment 102<br/><br/>6.5 The Requirements and KPI Targets of 6G 102<br/><br/>6.5.1 Extremely Low Latency 102<br/><br/>6.5.2 Low Power Consumption 102<br/><br/>6.5.3 High Data Rates 103<br/><br/>6.5.4 High-Frequency Bands 103<br/><br/>6.5.5 Ultra-Reliability 103<br/><br/>6.5.6 Security and Privacy 103<br/><br/>6.5.7 Massive Connection Density 104<br/><br/>6.5.8 Extreme Coverage Extension 104<br/><br/>6.5.9 Mobility 104<br/><br/>6.6 6G Applications 104<br/><br/>6.7 Challenges in 6G: Standardization, Design, and Deployment 104<br/><br/>References 106<br/><br/>7 Cybersecurity in Digital Transformation Era: Security Risks and Solutions 109<br/><br/>7.1 Introduction 109<br/><br/>7.2 Digital Transformation and Mesh Networks of Networks 109<br/><br/>7.3 Security as the Enemy of Digital Transformation 111<br/><br/>7.4 The Current State of Cybercrime 113<br/><br/>7.5 Security and Technologies of the Digital Transformation Economy 115<br/><br/>7.6 Tackling the Cybersecurity Maturity Challenges to Succeed with Digital Transformation 116<br/><br/>7.7 Security Maturity and Optimization: Perception versus Reality 117<br/><br/>7.7.1 Why Cybersecurity Maturity Is Not What It Should Be in the Digital Business and Transformation Reality 118<br/><br/>7.7.2 Why Cybersecurity Maturity and Strategy Are Lagging 119<br/><br/>7.8 Changing Security Parameters and Cyber Risks Demand a Holistic Security Approach for Digital Business 120<br/><br/>7.9 Cybersecurity Challenges and Digital Risks for the Future 121<br/><br/>7.10 Conclusion 122<br/><br/>References 122<br/><br/>8 Next Generations Networks: Integration, Trustworthiness, Privacy, and Security 125<br/><br/>8.1 Introduction 125<br/><br/>8.2 The State of 5G Networks 127<br/><br/>8.2.1 Applications and Services of 5G Technologies 128<br/><br/>8.3 6G: Key Technologies 130<br/><br/>8.4 6G: Application and Services 134<br/><br/>8.5 Benefits of 6G over 5G: A Comparison 135<br/><br/>8.5.1 Artificial Intelligence in 5G and 6G: Benefits and Challenges 135<br/><br/>8.5.2 Artificial Intelligence and Cybersecurity 136<br/><br/>8.5.3 Benefits and Challenges of AI and 6G for Cybersecurity as Defense and Offense 136<br/><br/>8.6 6G: Integration and Roadmap 137<br/><br/>8.7 Key Words in Safeguarding 6G 137<br/><br/>8.7.1 Trust 137<br/><br/>8.7.2 Security 137<br/><br/>8.7.3 Privacy 138<br/><br/>8.8 Trustworthiness in 6G 138<br/><br/>8.8.1 Is Trust Networking Needed? 138<br/><br/>8.8.2 Benefits of Trust Networking for 6G 138<br/><br/>8.8.3 Constraints of Trust Networking in 6G 138<br/><br/>8.8.4 Principles for Trust Networking 139<br/><br/>8.8.5 Challenges in Trust Networking for 6G 139<br/><br/>8.9 Network Security Architecture for 6G 140<br/><br/>8.9.1 Privacy and Security in IoT for 6G 140<br/><br/>8.10 6G Wireless Systems 141<br/><br/>8.10.1 Advances 141<br/><br/>8.10.2 Physical Layer Security as a Means of Confidentiality 142<br/><br/>8.10.3 Challenges of Implementing Federated Learning 143<br/><br/>8.10.4 Physical Layer Security for Six-Generation Connectivity 143<br/><br/>8.10.5 Physical Layer Security Using Light Communications 144<br/><br/>8.10.6 Challenges for Physical Layer Security 144<br/><br/>8.10.7 Privacy Requirements for 6G 145<br/><br/>8.10.8 Is Personal Information Really Personal? 145<br/><br/>8.11 Fifth Generation vs. Sixth Generation 145<br/><br/>8.12 Conclusion 146<br/><br/>References 147<br/><br/>9 Artificial Intelligence: Cybersecurity and Security Threats 149<br/><br/>9.1 Introduction 149<br/><br/>9.2 5G and 6G 150<br/><br/>9.3 Cybersecurity in Its Current State 151<br/><br/>9.4 AI as a Concept 153<br/><br/>9.5 AI: A Solution for Cybersecurity 154<br/><br/>9.6 AI: New Challenges in Cybersecurity 154<br/><br/>9.7 Conclusion 156<br/><br/>References 156<br/><br/>10 Impact of Artificial Intelligence and Machine Learning on Cybersecurity 159<br/><br/>10.1 Introduction 159<br/><br/>10.2 What Is Artificial Intelligence (AI)? 160<br/><br/>10.2.1 Reactive Machines 160<br/><br/>10.2.2 Limited Memory 160<br/><br/>10.2.3 Theory of Mind 160<br/><br/>10.2.4 Self-Awareness 161<br/><br/>10.3 The Transformative Power of AI 161<br/><br/>10.4 Understanding the Relationship Between AI and Cybersecurity 161<br/><br/>10.5 The Promise and Challenges of AI for Cybersecurity 162<br/><br/>10.5.1 Risks and Impacts of AI on Cybersecurity (Threats and Solutions) 163<br/><br/>10.5.1.1 Domestic Risks 164<br/><br/>10.5.1.2 Local Risks 164<br/><br/>10.5.1.3 National Risks 164<br/><br/>10.5.1.4 Why Prediction and Prevention 164<br/><br/>10.6 Broad Domain of AI Security (Major Themes in the AI Security Landscape) 164<br/><br/>10.6.1 Digital/Physical 165<br/><br/>10.6.2 Protection from Malicious Use of AI and Automated Cyberattacks 165<br/><br/>10.6.3 Other Technologies with AI and Their Integration 165<br/><br/>10.6.4 Political 165<br/><br/>10.6.5 Manipulation and Disinformation Protection 165<br/><br/>10.6.6 Infrastructure Based on AI and Digital Expertise of Government 166<br/><br/>10.6.6.1 Economic 166<br/><br/>10.6.6.2 Labor Displacement and Its Mitigation 166<br/><br/>10.6.6.3 Promotion of AI R&D 166<br/><br/>10.6.6.4 Education and Training That Is Updated 167<br/><br/>10.7 Transparency of Artificial Intelligence and Accountability Societal Aspects 167<br/><br/>10.7.1 Rights of Privacy and Data 167<br/><br/>10.8 Global AI Security Priorities 168<br/><br/>10.8.1 Global Economy 168<br/><br/>10.8.2 Global Privacy and Data Rights 168<br/><br/>10.8.2.1 AI and Ethics 169<br/><br/>10.8.3 Automation of Cyberattacks or Social Engineering Attacks 170<br/><br/>10.8.4 Target Prioritizing with Machine Learning 170<br/><br/>10.9 Automation of Services in Cybercriminal Offense 170<br/><br/>10.9.1 Increased Scale of Attacks 170<br/><br/>10.10 The Future of AI in Cybersecurity 171<br/><br/>10.11 Conclusion 171<br/><br/>References 172<br/><br/>11 AI and Cybersecurity: Paving the Way for the Future 175<br/><br/>11.1 Introduction 175<br/><br/>11.2 IoT Security and the Role of AI 176<br/><br/>11.3 Cybercrime and Cybersecurity 179<br/><br/>11.4 How Can AI Help Solve These Problems? 181<br/><br/>11.5 The Realm of Cyberspace 181<br/><br/>11.6 Connected Devices and Cybersecurity 182<br/><br/>11.7 Solutions for Data Management in Cybersecurity 183<br/><br/>11.8 Conclusion 183<br/><br/>References 184<br/><br/>12 Future 6G Networks 185<br/><br/>12.1 Introduction 185<br/><br/>12.2 Vision, Challenges, and Key Features for Future 6G Networks 186<br/><br/>12.2.1 Fourth Generation Long-Term Evolution (4G-LTE) 187<br/><br/>12.3 Rationale for 6G Networks with Prevailing and Future Success of 5G 188<br/><br/>12.4 Missing Units from LTE and 5G That 6G Will Integrate 189<br/><br/>12.5 Features of 6G Networks 189<br/><br/>12.5.1 Large Bandwidth 189<br/><br/>12.5.2 Artificial Intelligence 189<br/><br/>12.5.3 Operational Intelligence 190<br/><br/>12.6 Wireless Networks 190<br/><br/>12.6.1 Beyond 5G and Toward 6G 190<br/><br/>12.6.2 Visible-Light Communications 191<br/><br/>12.6.3 E-MBB Plus 191<br/><br/>12.6.4 Big Communications 191<br/><br/>12.6.5 Secure Ultra-Reliable Low-Latency Communications 192<br/><br/>12.6.6 Three-Dimensional Integrated Communications 192<br/><br/>12.6.7 Underwater Communication 193<br/><br/>12.6.8 Space Communication 194<br/><br/>12.6.9 UAV-Based Communication 194<br/><br/>12.6.10 Unconventional Data Communications 194<br/><br/>12.6.11 Tactical Communications 195<br/><br/>12.6.12 Holographic Communications 195<br/><br/>12.6.13 Human-Bond Communications 196<br/><br/>12.7 Challenges for 6G Networks 196<br/><br/>12.7.1 Potential Health Issues 196<br/><br/>12.7.2 Security and Privacy Concerns 197<br/><br/>12.7.3 Research Activities and Trends 197<br/><br/>12.8 Conclusion 198<br/><br/>References 200<br/><br/>Index 203
520 ## - SUMMARY, ETC.
Summary, etc The transition from the fifth generation of wireless communication (5G) to the coming sixth generation (6G) promises to be one of the most significant phases in the history of telecommunications. The technological, social, and logistical challenges promise to be significant, and meeting these challenges will determine the future of wireless communication. Experts and professionals across dozens of fields and industries are beginning to reckon seriously with these challenges as the 6G revolution approaches. From 5G to 6G provides an overview of this transition, offering a snapshot of a moment in which 5G is establishing itself and 6G draws ever nearer. It focuses on recent advances in wireless technology that brings 6G closer to reality, as well as the near-term challenges that still have to be met for this transition to succeed. The result is an essential book for anyone wishing to understand the future of wireless telecommunications in an increasingly connected world.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Abdulrahman Yarali, PhD is Professor of Cybersecurity and Network Management at Murray State University, Kentucky, USA. He also has extensive industry experience in wireless communications, with his research teams completing contracts for AT&T, Nortel, Spring PCS, and more.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile communication systems
Authority record control number https://id.loc.gov/authorities/subjects/sh85086371
General subdivision Technological innovations.
Authority record control number https://id.loc.gov/authorities/subjects/sh2001009095.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile communication systems
Authority record control number https://id.loc.gov/authorities/subjects/sh85086371
General subdivision Security measures.
Authority record control number https://id.loc.gov/authorities/subjects/sh99005297.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element 5G mobile communication systems.
Authority record control number https://id.loc.gov/authorities/subjects/sh2019000281.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element 6G mobile communication systems.
Authority record control number https://id.loc.gov/authorities/subjects/sh2022008027.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119883111
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-08-28 ALBASA Consortium 2025-08-28 2025-08-28 EBOOK