| 000 -LEADER |
| fixed length control field |
15125cam a2200433 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250917093734.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr cnu|||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
250917s2024 njum o u||| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781394213597 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781394213924 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1394213921 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Cancelled/invalid ISBN |
139421359X |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Cancelled/invalid ISBN |
9781394213597 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781394213948 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1394213948 |
| Qualifying information |
(electronic bk.) |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1002/9781394213948 |
| Source of number or code |
doi |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1410591885 |
| Canceled/invalid control number |
(OCoLC)1410389802 |
| -- |
(OCoLC)1412628618 |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23/eng/20240110 |
| 245 00 - TITLE STATEMENT |
| Title |
Automated secure computing for next-generation systems / |
| Statement of responsibility, etc |
edited by Amit Kumar Tyagi. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Hoboken, NJ : |
| Name of publisher, distributor, etc |
Wiley, |
| Date of publication, distribution, etc |
2024. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (468 pages) |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier. |
| 340 ## - PHYSICAL MEDIUM |
| Source |
rdacc |
| Authority record control number or standard number |
http://rdaregistry.info/termList/RDAColourContent/1003. |
| 500 ## - GENERAL NOTE |
| General note |
Description based upon print version of record. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
Security is always a primary concern for each application and sector. In the last decade, many techniques and frameworks have been suggested to improve security (data, information, and network). Due to rapid improvements in industry automation, however, systems need to be secured more quickly and efficiently. It is important to explore the best ways to incorporate the suggested solutions to improve their accuracy while reducing their learning cost. During implementation, the most difficult challenge is determining how to exploit AI and ML algorithms for improved safe service computation while maintaining the user's privacy. The robustness of AI and deep learning, as well as the reliability and privacy of data, is an important part of modern computing. It is essential to determine the security issues of using AI to protect systems or ML-based automated intelligent systems. To enforce them in reality, privacy would have to be maintained throughout the implementation process. This book presents groundbreaking applications related to artificial intelligence and machine learning for more stable and privacy-focused computing. By reflecting on the role of machine learning in information, cyber, and data security, Automated Secure Computing for Next-Generation Systems outlines recent developments in the security domain with artificial intelligence, machine learning, and privacy-preserving methods and strategies. To make computation more secure and confidential, the book provides ways to experiment, conceptualize, and theorize about issues that include AI and machine learning for improved security and preserve privacy in next-generation-based automated and intelligent systems. Hence, this book provides a detailed description of the role of AI, ML, etc., in automated and intelligent systems used for solving critical issues in various sectors of modern society. |
| 545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
| Biographical or historical note |
About the Author<br/>Amit Kumar Tyagi, PhD, is an assistant professor, at the National Institute of Fashion Technology, New Delhi, India. He has published more than 100 papers in refereed international journals, conferences, and books. He has filed more than 20 national and international patents in the areas of deep learning, Internet of Things, cyber-physical systems, and computer vision. His current research focuses on smart and secure computing and privacy, amongst other interests. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| Authority record control number |
https://id.loc.gov/authorities/subjects/sh90001862. |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Tyagi, Amit Kumar, |
| Authority record control number |
https://id.loc.gov/authorities/names/no00080939 |
| Relator term |
editor. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948 |
| Link text |
Full text is available at Wiley Online Library Click here to view |
| 942 ## - ADDED ENTRY ELEMENTS |
| Source of classification or shelving scheme |
|
| Item type |
EBOOK |