000863373 000__ 01726cam\a2200469Ii\4500 000863373 001__ 863373 000863373 005__ 20230306145743.0 000863373 006__ m\\\\\o\\d\\\\\\\\ 000863373 007__ cr\cn\nnnunnun 000863373 008__ 190226s2019\\\\sz\a\\\\ob\\\\001\0\eng\d 000863373 019__ $$a1089998574 000863373 020__ $$a9783030107130$$q(electronic book) 000863373 020__ $$a3030107132$$q(electronic book) 000863373 020__ $$z9783030107123 000863373 0247_ $$a10.1007/978-3-030-10713-0$$2doi 000863373 035__ $$aSP(OCoLC)on1088437621 000863373 035__ $$aSP(OCoLC)1088437621$$z(OCoLC)1089998574 000863373 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dDKU 000863373 049__ $$aISEA 000863373 050_4 $$aTK7882.E2 000863373 08204 $$a621.389/28$$223 000863373 1001_ $$aYan, Wei Qi,$$eauthor. 000863373 24510 $$aIntroduction to intelligent surveillance :$$bsurveillance data capture, transmission, and analytics /$$cWei Qi Yan. 000863373 250__ $$aThird edition. 000863373 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000863373 300__ $$a1 online resource (xiii, 222 pages) :$$billustrations. 000863373 336__ $$atext$$btxt$$2rdacontent 000863373 337__ $$acomputer$$bc$$2rdamedia 000863373 338__ $$aonline resource$$bcr$$2rdacarrier 000863373 347__ $$atext file$$bPDF$$2rda 000863373 4901_ $$aTexts in computer science,$$x1868-0941 000863373 504__ $$aIncludes bibliographical references and index. 000863373 506__ $$aAccess limited to authorized users. 000863373 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 26, 2019). 000863373 650_0 $$aElectronic surveillance. 000863373 650_0 $$aComputer security. 000863373 77608 $$iPrinted edition:$$z9783030107123 000863373 830_0 $$aTexts in computer science. 000863373 852__ $$bebk 000863373 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-10713-0$$zOnline Access$$91397441.1 000863373 909CO $$ooai:library.usi.edu:863373$$pGLOBAL_SET 000863373 980__ $$aEBOOK 000863373 980__ $$aBIB 000863373 982__ $$aEbook 000863373 983__ $$aOnline 000863373 994__ $$a92$$bISE