LEADER 03672nam 22005655 450 001 9910483970303321 005 20211020191901.0 010 $a3-030-53980-6 024 7 $a10.1007/978-3-030-53980-1 035 $a(CKB)4100000011384171 035 $a(MiAaPQ)EBC6299440 035 $a(DE-He213)978-3-030-53980-1 035 $a(PPN)250215748 035 $a(EXLCZ)994100000011384171 100 $a20200812d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2020 International Conference on Applications and Techniques in Cyber Intelligence$b[electronic resource] $eApplications and Techniques in Cyber Intelligence (ATCI 2020) /$fedited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (1,162 pages) $cillustrations 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v1244 311 $a3-030-53979-2 320 $aIncludes bibliographical references and index. 327 $aCombination of Information Technology and College English in the Age of Media -- The Application of Computer Internet of Things in Modern Agricultural Planting Management -- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity -- The Application Analysis of Computer Network Security Data Encryption Technology -- The Application of Computer Technology in Sports Training and Competition -- The Application of BIM Technology in Landscape Garden Engineering Projects -- College Physical Education Based on Multimedia Network Teaching Platform -- Development and Implementation of Health Information Management Platform in Medical Institutions -- Teaching Methods of University Economic Management Course Based on Python -- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles. 330 $aThis book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users. . 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v1244 606 $aEngineering$xData processing 606 $aComputational intelligence 606 $aData Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/T11040 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 615 0$aEngineering$xData processing. 615 0$aComputational intelligence. 615 14$aData Engineering. 615 24$aComputational Intelligence. 676 $a005.8 702 $aAbawajy$b Jemal H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChoo$b Kim-Kwang Raymond$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Zheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAtiquzzaman$b Mohammed$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483970303321 996 $a2020 International Conference on Applications and Techniques in Cyber Intelligence$92852092 997 $aUNINA