000 | 00948nam a2200325Ia 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20220912144026.0 | ||
006 | a|||||r|||| 00| 0 | ||
007 | ta | ||
008 | 220909b |||||||| |||| 00| 0 eng d | ||
020 | _a9780128053492 (pbk) | ||
024 | _a198211 | ||
037 | _b4388, 13/09/2017, Ashutosh Technical Books | ||
037 | _cTextual | ||
040 | _beng | ||
041 | _aeng | ||
082 | _aD65,8(B):(894), Q7 | ||
100 | _aEdgar Thomas W | ||
245 | 0 |
_cEdgar Thomas W; Manz David O _aResearch methods for cyber security |
|
260 |
_aCambridge _bElsevier _c2017 |
||
300 |
_axxiii, 404p. ill. _ccm |
||
500 | _aIndex 393-404p. | ||
650 | _a Machine learning | ||
650 | _a Scientific ethics | ||
650 | _a Thomas reserach | ||
650 | _aComputer Science | ||
700 | _a Manz David O | ||
942 |
_hD65,8(B):(894), Q7 _cTEXL _2CC |
||
999 |
_c1185 _d1185 |