Handbook of research on wireless security:
"This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source for students, educators, faculty members, re...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2008]
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection" - Provided by publisher |
Beschreibung: | Includes bibliographical references and index Druckausgabe in 2 Bänden erschienen |
Beschreibung: | 1 Online-Ressource (xxxiv, 789, 22, 12 Seiten) |
ISBN: | 9781599049007 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044800550 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 180301s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781599049007 |9 978-1-59904-900-7 | ||
024 | 7 | |a 10.4018/978-1-59904-899-4 |2 doi | |
035 | |a (OCoLC)1027746577 | ||
035 | |a (DE-599)BVBBV044800550 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
050 | 0 | |a TK5102.85 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Handbook of research on wireless security |c Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA), Miao Ma (Hong Kong University of Science and Technology, Hong Kong) |
246 | 1 | 3 | |a Wireless security |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2008] | |
264 | 4 | |c © 2008 | |
300 | |a 1 Online-Ressource (xxxiv, 789, 22, 12 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Druckausgabe in 2 Bänden erschienen | ||
520 | |a "This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection" - Provided by publisher | ||
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Zhang, Yan |4 edt | |
700 | 1 | |a Zheng, Jun |4 edt | |
700 | 1 | |a Ma, Miao |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59904-899-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59904-899-X |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030195512 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-899-4 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-899-4 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-899-4 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-899-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138581915467776 |
---|---|
adam_text | |
any_adam_object | |
author2 | Zhang, Yan Zheng, Jun Ma, Miao |
author2_role | edt edt edt |
author2_variant | y z yz j z jz m m mm |
author_facet | Zhang, Yan Zheng, Jun Ma, Miao |
building | Verbundindex |
bvnumber | BV044800550 |
callnumber-first | T - Technology |
callnumber-label | TK5102 |
callnumber-raw | TK5102.85 |
callnumber-search | TK5102.85 |
callnumber-sort | TK 45102.85 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 ST 277 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1027746577 (DE-599)BVBBV044800550 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044800550</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180301s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599049007</subfield><subfield code="9">978-1-59904-900-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59904-899-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027746577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044800550</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5102.85</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of research on wireless security</subfield><subfield code="c">Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA), Miao Ma (Hong Kong University of Science and Technology, Hong Kong)</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Wireless security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2008]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiv, 789, 22, 12 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Druckausgabe in 2 Bänden erschienen</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zheng, Jun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ma, Miao</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59904-899-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59904-899-X</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030195512</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-899-4</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-899-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-899-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-899-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044800550 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:08:45Z |
institution | BVB |
isbn | 9781599049007 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030195512 |
oclc_num | 1027746577 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xxxiv, 789, 22, 12 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Information Science Reference |
record_format | marc |
spelling | Handbook of research on wireless security Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA), Miao Ma (Hong Kong University of Science and Technology, Hong Kong) Wireless security Hershey ; New York Information Science Reference [2008] © 2008 1 Online-Ressource (xxxiv, 789, 22, 12 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Druckausgabe in 2 Bänden erschienen "This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection" - Provided by publisher Wireless communication systems Security measures Funknetz (DE-588)4216130-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Funknetz (DE-588)4216130-7 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s b DE-604 Zhang, Yan edt Zheng, Jun edt Ma, Miao edt Erscheint auch als Druck-Ausgabe 978-1-59904-899-4 Erscheint auch als Druck-Ausgabe 1-59904-899-X http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Handbook of research on wireless security Wireless communication systems Security measures Funknetz (DE-588)4216130-7 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4216130-7 (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Handbook of research on wireless security |
title_alt | Wireless security |
title_auth | Handbook of research on wireless security |
title_exact_search | Handbook of research on wireless security |
title_full | Handbook of research on wireless security Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA), Miao Ma (Hong Kong University of Science and Technology, Hong Kong) |
title_fullStr | Handbook of research on wireless security Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA), Miao Ma (Hong Kong University of Science and Technology, Hong Kong) |
title_full_unstemmed | Handbook of research on wireless security Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA), Miao Ma (Hong Kong University of Science and Technology, Hong Kong) |
title_short | Handbook of research on wireless security |
title_sort | handbook of research on wireless security |
topic | Wireless communication systems Security measures Funknetz (DE-588)4216130-7 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Wireless communication systems Security measures Funknetz Datensicherung Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-899-4 |
work_keys_str_mv | AT zhangyan handbookofresearchonwirelesssecurity AT zhengjun handbookofresearchonwirelesssecurity AT mamiao handbookofresearchonwirelesssecurity AT zhangyan wirelesssecurity AT zhengjun wirelesssecurity AT mamiao wirelesssecurity |