000862436 000__ 01591cam\a2200421Ii\4500 000862436 001__ 862436 000862436 005__ 20230306145544.0 000862436 006__ m\\\\\o\\d\\\\\\\\ 000862436 007__ cr\cn\nnnunnun 000862436 008__ 190117s2019\\\\sz\a\\\\o\\\\\000\0\eng\d 000862436 020__ $$a9783030021108$$q(electronic book) 000862436 020__ $$a3030021106$$q(electronic book) 000862436 020__ $$z9783030021092 000862436 0247_ $$a10.1007/978-3-030-02110-8$$2doi 000862436 035__ $$aSP(OCoLC)on1082474696 000862436 035__ $$aSP(OCoLC)1082474696 000862436 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB$$dOCLCF$$dUAB 000862436 049__ $$aISEA 000862436 050_4 $$aQA76.9.A25 000862436 08204 $$a005.8$$223 000862436 1001_ $$aAl-Shaer, Ehab S.,$$d1967-$$eauthor. 000862436 24510 $$aAutonomous cyber deception :$$breasoning, adaptive planning, and evaluation of HoneyThings /$$cEhab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang. 000862436 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000862436 300__ $$a1 online resource (xvi, 235 pages) :$$billustrations 000862436 336__ $$atext$$btxt$$2rdacontent 000862436 337__ $$acomputer$$bc$$2rdamedia 000862436 338__ $$aonline resource$$bcr$$2rdacarrier 000862436 506__ $$aAccess limited to authorized users. 000862436 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 17, 2019). 000862436 650_0 $$aComputer security. 000862436 650_0 $$aComputer networks$$xSecurity measures. 000862436 7001_ $$aWei, Jinpeng,$$eauthor. 000862436 7001_ $$aHamlen, Kevin,$$eauthor. 000862436 7001_ $$aWang, Cliff,$$eauthor. 000862436 852__ $$bebk 000862436 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-02110-8$$zOnline Access$$91397441.1 000862436 909CO $$ooai:library.usi.edu:862436$$pGLOBAL_SET 000862436 980__ $$aEBOOK 000862436 980__ $$aBIB 000862436 982__ $$aEbook 000862436 983__ $$aOnline 000862436 994__ $$a92$$bISE