|
|
|
|
LEADER |
01706nam a2200481 i 4500 |
001 |
100274 |
003 |
CZ ZlUTB |
005 |
20210205142712.0 |
007 |
ta |
008 |
210111s2017 sz a e 001 0 eng d |
999 |
|
|
|c 100274
|d 100274
|
020 |
|
|
|a 978-3-319-67524-4
|q (vázáno)
|
040 |
|
|
|a ZLD002
|b cze
|e rda
|
072 |
|
7 |
|a 35
|x Veřejná správa
|2 Konspekt
|9 15
|
080 |
|
|
|a 351.78:004.7
|2 MRF
|
080 |
|
|
|a 351.74
|2 MRF
|
080 |
|
|
|a 510.5
|2 MRF
|
080 |
|
|
|a (048.8:082)
|2 MRF
|
100 |
1 |
|
|a Mehrotra, Kishan G.
|4 aut
|
245 |
1 |
0 |
|a Anomaly detection principles and algorithms /
|c Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
|
264 |
|
1 |
|a Cham :
|b Springer,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a xxii, 217 stran :
|b ilustrace ;
|c 24 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a bez média
|b n
|2 rdamedia
|
338 |
|
|
|a svazek
|b nc
|2 rdacarrier
|
490 |
0 |
|
|a Terrorism, security, and computation
|
504 |
|
|
|a Obsahuje bibliografii a rejstřík
|
650 |
0 |
7 |
|a kybernetická bezpečnost
|7 ph716242
|2 czenas
|
650 |
0 |
7 |
|a veřejná bezpečnost
|7 ph127071
|2 czenas
|
650 |
0 |
7 |
|a algoritmy
|7 ph114026
|2 czenas
|
650 |
0 |
9 |
|a cyber security
|2 eczenas
|
650 |
0 |
9 |
|a public safety
|2 eczenas
|
650 |
0 |
9 |
|a algorithms
|2 eczenas
|
653 |
|
|
|a anomaly detection
|
655 |
|
7 |
|a kolektivní monografie
|7 fd501537
|2 czenas
|
655 |
|
9 |
|a collective monographs
|2 eczenas
|
700 |
1 |
|
|a Mohan, Chilukuri K.
|4 aut
|
700 |
1 |
|
|a Huang, HuaMing
|4 aut
|
910 |
|
|
|a ZLD002
|
942 |
|
|
|2 udc
|
992 |
|
|
|a BK
|b SK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 35MEHROTRAKG
|7 0
|8 BOOK
|9 160244
|a UTBZL
|b UTBZL
|c 007
|d 2021-01-11
|l 1
|m 1
|o 35/MEHROTRA,K.G.
|p 420010185964
|q 2024-12-23
|r 2021-01-26
|s 2021-01-26
|v 1730.00
|x N: nákup, pro Mirstaki, Sina;
|y 08
|