Learning Resource and Development

Wireless communication security / (Record no. 29092)

MARC details
000 -LEADER
fixed length control field 01916nam a2200313 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250311104839.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250310s2023 njua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119777144
040 ## - CATALOGING SOURCE
Transcribing agency CSPC
Original cataloging agency CSPC
Language of cataloging eng
Description conventions rda
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5103.2
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number W743
Edition number 23
245 00 - TITLE STATEMENT
Title Wireless communication security /
Statement of responsibility, etc. edited by Manju Khari, Manisha Bharti, and M. Niranjanamurthy.
246 34 - VARYING FORM OF TITLE
Title proper/short title Wireless communication security :
Remainder of title mobile and network security protocols.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 267 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Advances in data engineering and machine learning
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note M2M in 5G cellular networks : challenges, proposed solutions, and future directions -- MAC layer protocol for wireless security -- Enhanced image security through hybrid approach: protect your copyright over digital images -- Quantum computing -- Feature engineering for flow-based IDS -- A comprehensive study of intrusion detection and prevention systems -- Hardware devices integration with IoT -- Depth analysis on DoS & DDoS attacks -- SQL injection attack on database system -- Machine learning techniques for face authentication system for security purposes -- Estimation of computation time for software-defined -- Networking-based data traffic offloading system in heterogenous network.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless communication systems
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Khari, Manju,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bharti, Manisha,
Relator term editor.
700 2# - ADDED ENTRY--PERSONAL NAME
Personal name Niranjanamurthy, M.,
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Edition 23
Classification part 005.8
Call number prefix CIR
Call number suffix 2023
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Circulation Section 03/10/2025   CIR 005.8 W743 2023 029157 03/10/2025 1-1 03/10/2025 Books