MARC details
000 -LEADER |
fixed length control field |
04183cam a2200457 i 4500 |
001 - CONTROL NUMBER |
control field |
1405843019 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250130162729.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231025t20232023nju o 000 0 eng d |
019 ## - |
-- |
1405405523 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781394167401 |
Qualifying information |
electronic book |
|
International Standard Book Number |
1394167407 |
Qualifying information |
electronic book |
|
International Standard Book Number |
1394167385 |
Qualifying information |
electronic book |
|
International Standard Book Number |
9781394167388 |
Qualifying information |
(electronic bk.) |
|
Canceled/invalid ISBN |
9781394166336 |
Qualifying information |
hardcover |
|
Canceled/invalid ISBN |
1394166338 |
Qualifying information |
hardcover |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1405843019 |
Canceled/invalid control number |
(OCoLC)1405405523 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDX |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
YDX |
Modifying agency |
YDX |
-- |
OCLKB |
-- |
DG1 |
-- |
OCLCO |
-- |
N$T |
-- |
SFB |
-- |
OCLCF |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
Q83 2023 |
245 00 - TITLE STATEMENT |
Title |
Quantum computing in cybersecurity / |
Statement of responsibility, etc. |
edited by Romil Rawat... [and 6 others] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons, Inc. ; |
Place of production, publication, distribution, manufacture |
Beverly, MA : |
Name of producer, publisher, distributor, manufacturer |
Scrivener Publishing LLC, |
Date of production, publication, distribution, manufacture, or copyright notice |
2023 |
|
Date of production, publication, distribution, manufacture, or copyright notice |
©2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
340 ## - PHYSICAL MEDIUM |
-- |
polychrome |
Source |
rdacc |
Authority record control number or standard number |
http://rdaregistry.info/termList/RDAColourContent/1003 |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Available to OhioLINK libraries |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
Authority record control number or standard number |
https://id.loc.gov/authorities/subjects/sh90001862 |
9 (RLIN) |
912 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Rawat, Romil, |
Dates associated with a name |
1986- |
Authority record control number or standard number |
https://id.loc.gov/authorities/names/n2021070080 |
Relator term |
editor |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
Ohio Library and Information Network. |
Authority record control number or standard number |
https://id.loc.gov/authorities/names/no95058981 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
1394166338 |
-- |
9781394166336 |
Record control number |
(OCoLC)1399164561 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
OhioLINK |
Public note |
Connect to resource |
Uniform Resource Identifier |
<a href="https://rave.ohiolink.edu/ebooks/ebc2/9781394167401">https://rave.ohiolink.edu/ebooks/ebc2/9781394167401</a> |
|
Materials specified |
Wiley Online Library |
Public note |
Connect to resource |
Uniform Resource Identifier |
<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a> |
|
Materials specified |
Wiley Online Library |
Public note |
Connect to resource (off-campus) |
Uniform Resource Identifier |
<a href="https://go.ohiolink.edu/goto?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://go.ohiolink.edu/goto?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a> |
|
Materials specified |
O'Reilly |
Public note |
Connect to resource |
Uniform Resource Identifier |
<a href="https://learning.oreilly.com/library/view/~/9781394166336/?ar">https://learning.oreilly.com/library/view/~/9781394166336/?ar</a> |