Quantum computing in cybersecurity / (Record no. 200463843)

MARC details
000 -LEADER
fixed length control field 04183cam a2200457 i 4500
001 - CONTROL NUMBER
control field 1405843019
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250130162729.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231025t20232023nju o 000 0 eng d
019 ## -
-- 1405405523
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394167401
Qualifying information electronic book
International Standard Book Number 1394167407
Qualifying information electronic book
International Standard Book Number 1394167385
Qualifying information electronic book
International Standard Book Number 9781394167388
Qualifying information (electronic bk.)
Canceled/invalid ISBN 9781394166336
Qualifying information hardcover
Canceled/invalid ISBN 1394166338
Qualifying information hardcover
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1405843019
Canceled/invalid control number (OCoLC)1405405523
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
Transcribing agency YDX
Modifying agency YDX
-- OCLKB
-- DG1
-- OCLCO
-- N$T
-- SFB
-- OCLCF
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number Q83 2023
245 00 - TITLE STATEMENT
Title Quantum computing in cybersecurity /
Statement of responsibility, etc. edited by Romil Rawat... [and 6 others]
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc. ;
Place of production, publication, distribution, manufacture Beverly, MA :
Name of producer, publisher, distributor, manufacturer Scrivener Publishing LLC,
Date of production, publication, distribution, manufacture, or copyright notice 2023
Date of production, publication, distribution, manufacture, or copyright notice ©2023
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
340 ## - PHYSICAL MEDIUM
-- polychrome
Source rdacc
Authority record control number or standard number http://rdaregistry.info/termList/RDAColourContent/1003
520 ## - SUMMARY, ETC.
Summary, etc. Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available to OhioLINK libraries
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Authority record control number or standard number https://id.loc.gov/authorities/subjects/sh90001862
9 (RLIN) 912
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rawat, Romil,
Dates associated with a name 1986-
Authority record control number or standard number https://id.loc.gov/authorities/names/n2021070080
Relator term editor
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Ohio Library and Information Network.
Authority record control number or standard number https://id.loc.gov/authorities/names/no95058981
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 1394166338
-- 9781394166336
Record control number (OCoLC)1399164561
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified OhioLINK
Public note Connect to resource
Uniform Resource Identifier <a href="https://rave.ohiolink.edu/ebooks/ebc2/9781394167401">https://rave.ohiolink.edu/ebooks/ebc2/9781394167401</a>
Materials specified Wiley Online Library
Public note Connect to resource
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a>
Materials specified Wiley Online Library
Public note Connect to resource (off-campus)
Uniform Resource Identifier <a href="https://go.ohiolink.edu/goto?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://go.ohiolink.edu/goto?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a>
Materials specified O'Reilly
Public note Connect to resource
Uniform Resource Identifier <a href="https://learning.oreilly.com/library/view/~/9781394166336/?ar">https://learning.oreilly.com/library/view/~/9781394166336/?ar</a>
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Not for loan Collection code Home library Current library Date acquired Source of acquisition Cost, normal purchase price Inventory number Barcode Date last seen Cost, replacement price Date shelved Koha item type
    Library of Congress Classification Geçerli değil-e-Kitap / Not applicable-e-Book E-Kitap Koleksiyonu Merkez Kütüphane Merkez Kütüphane 30/12/2024 Satın Alma / Purchase 0.00 BİL EBK03725 30/12/2024 0.00 30/12/2024 E-Book
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.