LEADER 01036nam a2200277 i 4500 001 991000112519707536 008 090309s2009 nyu b 001 0 eng d 020 $a9780387724751 035 $ab13815726-39ule_inst 040 $aDip.to Matematica$beng 084 $aAMS 46-02 084 $aLC QA326.K26 100 1 $aKaniuth, Eberhard$0504660 245 12$aA course in commutative Banach algebras /$cEberhard Kaniuth 260 $aNew York :$bSpringer,$cc2009 300 $axii, 353 p. ;$c25 cm 440 0$aGraduate texts in mathematics,$x0072-5285 ;$v246 504 $aIncludes bibliographical references (p. [343]-348) and index 650 0$aBanach algebras 650 0$aCommutative algebra 907 $a.b13815726$b28-01-14$c09-03-09 912 $a991000112519707536 945 $aLE013 46-XX KAN31 (2009)$g1$i2013000209821$lle013$op$pE46.95$q-$rl$s- $t0$u0$v0$w0$x0$y.i14940681$z09-03-09 996 $aCourse in commutative banach algebras$9807685 997 $aUNISALENTO 998 $ale013$b09-03-09$cm$da $e-$feng$gnyu$h2$i0 LEADER 04217nam 22006135 450 001 9910633913903321 005 20251113180208.0 010 $a981-19-6290-1 024 7 $a10.1007/978-981-19-6290-5 035 $a(MiAaPQ)EBC7151149 035 $a(Au-PeEL)EBL7151149 035 $a(CKB)25510414800041 035 $a(OCoLC)1353100723 035 $a(DE-He213)978-981-19-6290-5 035 $a(EXLCZ)9925510414800041 100 $a20221201d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPredictive Data Security using AI $eInsights and Issues of Blockchain, IoT, and DevOps /$fedited by Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (222 pages) 225 1 $aStudies in Computational Intelligence,$x1860-9503 ;$v1065 311 08$aPrint version: Thakkar, Hiren Kumar Predictive Data Security Using AI Singapore : Springer,c2023 9789811962899 320 $aIncludes bibliographical references. 327 $aIntroduction to Data Security with Machine Learning: Traditional Methods vs Recent Trends -- Data Security and Predictive Informatics: Issues, Challenges, and Opportunities -- Data Security Analytics using Machine Learning: Supervised and Unsupervised Approaches -- Data Security in Data Servers: Implementation of Security in Data Servers, Content Delivery Network Servers and Proxy Servers -- Data Security in Multimedia using AI: Perspective and Practices -- Data Security in Blockchain: Data Generation, Analysis and Predictions. 330 $aThis contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues. 410 0$aStudies in Computational Intelligence,$x1860-9503 ;$v1065 606 $aData protection 606 $aInternet of things 606 $aArtificial intelligence 606 $aData and Information Security 606 $aInternet of Things 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aInternet of things. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aInternet of Things. 615 24$aArtificial Intelligence. 676 $a006.3 702 $aThakkar$b Hiren Kumar 702 $aSwarnkar$b Mayank 702 $aBhadoria$b Robin Singh 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910633913903321 996 $aPredictive data security using AI$93086011 997 $aUNINA