Librarian View
LEADER
03993nam a2200649 i 4500
001
17501584
005
20241025093921.0
006
m o d
007
cr cnu---unuuu
008
240604s2025 njua ob 001 0 eng
010
|a
2024020967
020
|a
9781394254958
|q
electronic book
020
|a
1394254954
|q
electronic book
020
|a
9781394254965
|q
electronic book
020
|a
1394254962
|q
electronic book
020
|a
9781394310562
|q
electronic book
020
|a
1394310560
|q
electronic book
020
|z
9781394254941
|q
hardcover
024
|a
21116722
035
|a
(DLC)ybp21116722
040
|a
NhCcYBP
|c
NhCcYBP
042
|a
pcc
050
4
|a
HC79.T4
|b
B735 2025
090
|a
HC79.T4
|b
B735 2025 (LC)
100
1
|a
Brooks, Chuck
|c
(Writer of Inside cyber),
|e
author.
245
1
0
|a
Inside cyber :
|b
how AI, 5G, IoT, and quantum computing will transform privacy and our security /
|c
Chuck Brooks.
246
3
0
|a
How AI, 5G, IoT, and quantum computing will transform privacy and our security
246
3
|a
How artificial intelligence, 5G, internet of things, and quantum computing will transform privacy and our security
264
1
|a
Hoboken, New Jersey :
|b
John Wiley & Sons, Inc.,
|c
[2025]
300
|a
1 online resource ( xi, 227 pages) :
|b
illustrations (chiefly color)
336
|a
text
|b
txt
|2
rdacontent
337
|a
computer
|b
c
|2
rdamedia
338
|a
online resource
|b
cr
|2
rdacarrier
504
|a
Includes bibliographical references and index.
505
0
|a
An overview of our merged physical and digital world and cybersecurity -- Cyber threats, targets, and digital convergence -- Common cyber threats and tools -- Cyber threat targets -- Cybersecurity and digital transformation -- Artificial intelligence: what is it? -- Types of artificial intelligence -- Some sub domains of artificial intelligence -- Big data and data analytics -- Generative artificial intelligence -- The state of artificial intelligence and smart cybersecurity -- some insights and statistics -- How artificial intelligence can help cybersecurity -- The other side of the artificial intelligence cyber coin -- Responding to artificial intelligence cyber threats -- Artificial intelligence and privacy -- Artificial intelligence and ethics -- The interface between humans and computers -- Artificial intelligence and communications -- Artificial intelligence and healthcare -- a case study -- The internet of things -- 5G -- Quantum computing -- Quantum technologies and cybersecurity -- Quantum internet of things -- The holy digital grail -- cybersecurity risk management -- The urgency of having a cyber risk management plan.
506
|a
Access restricted by licensing agreement.
533
|a
Electronic reproduction.
|b
Hoboken, N.J.
|n
Available via World Wide Web.
588
|a
Description based on online resource; title from digital title page (viewed on October 16, 2024).
590
|a
Access is available to the Yale community.
650
0
|a
Technological innovations.
650
0
|a
Industrial productivity
|x
Effect of technological innovations on.
650
0
|a
Computer security.
650
0
|a
Artificial intelligence.
650
0
|a
5G mobile communication systems.
650
0
|a
Quantum computing.
710
2
|a
Wiley InterScience (Online service)
776
0
8
|i
Print version:
|a
Brooks, Chuck
|t
Inside cyber
|d
Hoboken, New Jersey : Wiley, [2024]
|z
9781394254941
|w
(DLC) 2024020966
856
4
0
|y
Online book
|u
https://yale.idm.oclc.org/login?URL=https://onlinelibrary.wiley.com/book/10.1002/9781394310562
901
|a
HC79.T4
902
|a
Yale Internet Resource
|b
Yale Internet Resource >> None Online resource|DELIM|17365945
905
|a
online resource
907
|a
2024-10-25T09:39:21.000Z
946
|a
DO NOT EDIT. DO NOT EXPORT.
953
|a
https://onlinelibrary.wiley.com/book/10.1002/9781394310562
960
|o
1
|s
28.00
|t
yulintx
|u
YBSCIEN251
961
|c
241023
|f
213471
|m
653134
987
|c
None
|d
Online resource