![9783662508787-3662508788-Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Intelligent Systems Reference Library, 70)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_51aMFok-2vL._SL500_.jpg)
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Intelligent Systems Reference Library, 70)
ISBN-13:
9783662508787
ISBN-10:
3662508788
Edition:
Softcover reprint of the original 1st ed. 2014
Author:
Aboul Ella Hassanien, Tai-hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
Publication date:
2016
Publisher:
Springer
Format:
Paperback
607 pages
FREE US shipping
Book details
ISBN-13:
9783662508787
ISBN-10:
3662508788
Edition:
Softcover reprint of the original 1st ed. 2014
Author:
Aboul Ella Hassanien, Tai-hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
Publication date:
2016
Publisher:
Springer
Format:
Paperback
607 pages
Summary
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Intelligent Systems Reference Library, 70) (ISBN-13: 9783662508787 and ISBN-10: 3662508788), written by authors
Aboul Ella Hassanien, Tai-hoon Kim, Janusz Kacprzyk, Ali Ismail Awad, was published by Springer in 2016.
With an overall rating of 3.6 stars, it's a notable title among other
books. You can easily purchase or rent Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Intelligent Systems Reference Library, 70) (Paperback) from BooksRun,
along with many other new and used
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}