Artificial intelligence and national security
Contributors: | |
---|---|
Format: | Electronic/Print Book |
Language: | English |
Published: |
Cham
Springer
[2022]
|
In: | Year: 2022 |
Online Access: |
Table of Contents Blurb Presumably Free Access Volltext (doi) |
Availability in Tübingen: | Present in Tübingen. UB: KB 21 A 2575 |
Check availability: | HBZ Gateway |
Keywords: | |
Related Items: | Erscheint auch als:
1817966723 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1820062287 | ||
003 | DE-627 | ||
005 | 20240514001913.0 | ||
007 | tu | ||
008 | 221026s2022 sz ||||| 00| ||eng c | ||
020 | |a 9783031067082 |c hbk. : (£119.99) |9 978-3-031-06708-2 | ||
024 | 7 | |a 10.1007/978-3-031-06709-9 |2 doi | |
035 | |a (DE-627)1820062287 | ||
035 | |a (DE-599)KXP1820062287 | ||
035 | |a (OCoLC)1420370167 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-CH | ||
082 | 0 | |a 355.03028563 | |
084 | |a 2,1 |2 ssgn | ||
245 | 1 | 0 | |a Artificial intelligence and national security |c Reza Montasari, editor |
263 | |a 202208 | ||
264 | 1 | |a Cham |b Springer |c [2022] | |
300 | |a viii, 230 Seiten |b Diagramme |c 24 cm | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |f FID |x XA-DE-BW |2 pdager |5 DE-21 | |
650 | 0 | |a National Security |x Data processing | |
650 | 0 | |a Artificial Intelligence | |
650 | 0 | |a Computer security | |
655 | 7 | |a Aufsatzsammlung |0 (DE-588)4143413-4 |0 (DE-627)105605727 |0 (DE-576)209726091 |2 gnd-content | |
689 | 0 | 0 | |d s |0 (DE-588)4011413-2 |0 (DE-627)106352873 |0 (DE-576)208893415 |a Demokratie |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4059276-5 |0 (DE-627)104665335 |0 (DE-576)209130180 |a Technologie |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4033447-8 |0 (DE-627)106257188 |0 (DE-576)209002050 |a Künstliche Intelligenz |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4802620-7 |0 (DE-627)472310364 |0 (DE-576)216543657 |a Big Data |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4274324-2 |0 (DE-627)104467525 |0 (DE-576)21070585X |a Computersicherheit |2 gnd |
689 | 0 | 5 | |d s |0 (DE-588)4127888-4 |0 (DE-627)105721344 |0 (DE-576)209597410 |a Innere Sicherheit |2 gnd |
689 | 0 | 6 | |d s |0 (DE-588)4639271-3 |0 (DE-627)330421344 |0 (DE-576)214542661 |a Social Media |2 gnd |
689 | 0 | 7 | |d s |0 (DE-588)1138303283 |0 (DE-627)895684276 |0 (DE-576)492480818 |a Radikalisierung |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Montasari, Reza |e HerausgeberIn |0 (DE-588)1273752279 |0 (DE-627)1823595820 |4 edt | |
776 | 1 | |z 9783031067099 |c e-Book | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Artificial intelligence and national security |d Cham : Springer International Publishing, 2022 |h 1 Online-Ressource (viii, 230 Seiten) |w (DE-627)1817966723 |z 9783031067099 |
856 | |u https://link.springer.com/content/pdf/bfm:978-3-031-06709-9/1?pdf=chapter%20toc |x unpaywall |z Vermutlich kostenfreier Zugang |h repository [oa repository (via OAI-PMH doi match)] | ||
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1820062287inh.htm |m V:DE-576 |m B:DE-21 |v 20221125194323 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz1820062287kla.htm |m V:DE-576 |m B:DE-21 |v 20221125194323 |3 Klappentext |
856 | |u https://doi.org/10.1007/978-3-031-06709-9 |x doi |3 Volltext | ||
951 | |a BO | ||
ELC | |a 1 |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 420225435X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1820062287 | ||
LOK | |0 005 20221125110923 | ||
LOK | |0 008 221026||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 21 A 2575 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 938 |a 2211 |f 34 | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 21 A 2575 |