Best practices in computer network defense: incident detection and response
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, DC
IOS Press
[2014]
|
Schriftenreihe: | NATO science for peace and security series. Sub-series D. Information and communication security
volume 35 |
Schlagworte: | |
Beschreibung: | Description based on print version record |
Beschreibung: | 1 online resource (160 pages) illustrations (some color) |
ISBN: | 9781614993711 9781614993728 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV044066937 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781614993711 |c Print |9 978-1-61499-371-1 | ||
020 | |a 9781614993728 |c ebook |9 978-1-61499-372-8 | ||
035 | |a (ZDB-30-PAD)EBC1637648 | ||
035 | |a (ZDB-89-EBL)EBL1637648 | ||
035 | |a (ZDB-38-EBR)ebr10843828 | ||
035 | |a (OCoLC)871189912 | ||
035 | |a (DE-599)BVBBV044066937 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Best practices in computer network defense |b incident detection and response |c edited by Melissa E. Hathaway |
264 | 1 | |a Washington, DC |b IOS Press |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (160 pages) |b illustrations (some color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series. Sub-series D. Information and communication security |v volume 35 | |
500 | |a Description based on print version record | ||
650 | 4 | |a Cyberinfrastructure |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Situational awareness | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Hathaway, Melissa E. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Best practices in computer network defense : incident detection and response |
912 | |a ZDB-30-PAD |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029473782 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177097419128832 |
---|---|
any_adam_object | |
author2 | Hathaway, Melissa E. |
author2_role | edt |
author2_variant | m e h me meh |
author_facet | Hathaway, Melissa E. |
building | Verbundindex |
bvnumber | BV044066937 |
collection | ZDB-30-PAD ZDB-38-ESG |
ctrlnum | (ZDB-30-PAD)EBC1637648 (ZDB-89-EBL)EBL1637648 (ZDB-38-EBR)ebr10843828 (OCoLC)871189912 (DE-599)BVBBV044066937 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01702nmm a2200433zcb4500</leader><controlfield tag="001">BV044066937</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993711</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-61499-371-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993728</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-61499-372-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC1637648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1637648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10843828</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)871189912</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044066937</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Best practices in computer network defense</subfield><subfield code="b">incident detection and response</subfield><subfield code="c">edited by Melissa E. Hathaway</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC</subfield><subfield code="b">IOS Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (160 pages)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series. Sub-series D. Information and communication security</subfield><subfield code="v">volume 35</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on print version record</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Situational awareness</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hathaway, Melissa E.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Best practices in computer network defense : incident detection and response</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029473782</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044066937 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:42:40Z |
institution | BVB |
isbn | 9781614993711 9781614993728 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029473782 |
oclc_num | 871189912 |
open_access_boolean | |
physical | 1 online resource (160 pages) illustrations (some color) |
psigel | ZDB-30-PAD ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series. Sub-series D. Information and communication security |
spelling | Best practices in computer network defense incident detection and response edited by Melissa E. Hathaway Washington, DC IOS Press [2014] © 2014 1 online resource (160 pages) illustrations (some color) txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series. Sub-series D. Information and communication security volume 35 Description based on print version record Cyberinfrastructure Security measures Computer networks Security measures Computer security Situational awareness 1\p (DE-588)1071861417 Konferenzschrift gnd-content Hathaway, Melissa E. edt Erscheint auch als Druck-Ausgabe Best practices in computer network defense : incident detection and response 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Best practices in computer network defense incident detection and response Cyberinfrastructure Security measures Computer networks Security measures Computer security Situational awareness |
subject_GND | (DE-588)1071861417 |
title | Best practices in computer network defense incident detection and response |
title_auth | Best practices in computer network defense incident detection and response |
title_exact_search | Best practices in computer network defense incident detection and response |
title_full | Best practices in computer network defense incident detection and response edited by Melissa E. Hathaway |
title_fullStr | Best practices in computer network defense incident detection and response edited by Melissa E. Hathaway |
title_full_unstemmed | Best practices in computer network defense incident detection and response edited by Melissa E. Hathaway |
title_short | Best practices in computer network defense |
title_sort | best practices in computer network defense incident detection and response |
title_sub | incident detection and response |
topic | Cyberinfrastructure Security measures Computer networks Security measures Computer security Situational awareness |
topic_facet | Cyberinfrastructure Security measures Computer networks Security measures Computer security Situational awareness Konferenzschrift |
work_keys_str_mv | AT hathawaymelissae bestpracticesincomputernetworkdefenseincidentdetectionandresponse |