Trusted recovery and defensive information warfare:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Kluwer
2002
|
Schriftenreihe: | Advances in information security
4 |
Schlagworte: | |
Beschreibung: | XVI, 133 S. |
ISBN: | 0792375726 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV014357826 | ||
003 | DE-604 | ||
005 | 20020722 | ||
007 | t | ||
008 | 020603s2002 xxu |||| 00||| eng d | ||
010 | |a 2001050335 | ||
020 | |a 0792375726 |9 0-7923-7572-6 | ||
035 | |a (OCoLC)48628796 | ||
035 | |a (DE-599)BVBBV014357826 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 005.86 |2 21 | |
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Liu, Peng |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trusted recovery and defensive information warfare |c by Peng Liu ; Sushil Jajodia |
264 | 1 | |a Boston [u.a.] |b Kluwer |c 2002 | |
300 | |a XVI, 133 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 4 | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Computer security |z United States | |
650 | 4 | |a Data recovery (Computer science) | |
650 | 4 | |a Defensive (Military science) | |
650 | 4 | |a Information warfare | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jajodia, Sushil |d 1947- |e Verfasser |0 (DE-588)120551683 |4 aut | |
830 | 0 | |a Advances in information security |v 4 |w (DE-604)BV014168308 |9 4 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-009841014 |
Datensatz im Suchindex
_version_ | 1804129244545024000 |
---|---|
any_adam_object | |
author | Liu, Peng Jajodia, Sushil 1947- |
author_GND | (DE-588)120551683 |
author_facet | Liu, Peng Jajodia, Sushil 1947- |
author_role | aut aut |
author_sort | Liu, Peng |
author_variant | p l pl s j sj |
building | Verbundindex |
bvnumber | BV014357826 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)48628796 (DE-599)BVBBV014357826 |
dewey-full | 005.86 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.86 |
dewey-search | 005.86 |
dewey-sort | 15.86 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01600nam a2200481zcb4500</leader><controlfield tag="001">BV014357826</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20020722 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020603s2002 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2001050335</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0792375726</subfield><subfield code="9">0-7923-7572-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)48628796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014357826</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.86</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Peng</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted recovery and defensive information warfare</subfield><subfield code="c">by Peng Liu ; Sushil Jajodia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Kluwer</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 133 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">4</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data recovery (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Defensive (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">4</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">4</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009841014</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV014357826 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:02:03Z |
institution | BVB |
isbn | 0792375726 |
language | English |
lccn | 2001050335 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009841014 |
oclc_num | 48628796 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XVI, 133 S. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Kluwer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Liu, Peng Verfasser aut Trusted recovery and defensive information warfare by Peng Liu ; Sushil Jajodia Boston [u.a.] Kluwer 2002 XVI, 133 S. txt rdacontent n rdamedia nc rdacarrier Advances in information security 4 Computer networks Security measures United States Computer security United States Data recovery (Computer science) Defensive (Military science) Information warfare Information warfare (DE-588)4461975-3 gnd rswk-swf Wiederherstellung Informatik (DE-588)4177289-1 gnd rswk-swf USA Information warfare (DE-588)4461975-3 s Wiederherstellung Informatik (DE-588)4177289-1 s DE-604 Jajodia, Sushil 1947- Verfasser (DE-588)120551683 aut Advances in information security 4 (DE-604)BV014168308 4 |
spellingShingle | Liu, Peng Jajodia, Sushil 1947- Trusted recovery and defensive information warfare Advances in information security Computer networks Security measures United States Computer security United States Data recovery (Computer science) Defensive (Military science) Information warfare Information warfare (DE-588)4461975-3 gnd Wiederherstellung Informatik (DE-588)4177289-1 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4177289-1 |
title | Trusted recovery and defensive information warfare |
title_auth | Trusted recovery and defensive information warfare |
title_exact_search | Trusted recovery and defensive information warfare |
title_full | Trusted recovery and defensive information warfare by Peng Liu ; Sushil Jajodia |
title_fullStr | Trusted recovery and defensive information warfare by Peng Liu ; Sushil Jajodia |
title_full_unstemmed | Trusted recovery and defensive information warfare by Peng Liu ; Sushil Jajodia |
title_short | Trusted recovery and defensive information warfare |
title_sort | trusted recovery and defensive information warfare |
topic | Computer networks Security measures United States Computer security United States Data recovery (Computer science) Defensive (Military science) Information warfare Information warfare (DE-588)4461975-3 gnd Wiederherstellung Informatik (DE-588)4177289-1 gnd |
topic_facet | Computer networks Security measures United States Computer security United States Data recovery (Computer science) Defensive (Military science) Information warfare Wiederherstellung Informatik USA |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT liupeng trustedrecoveryanddefensiveinformationwarfare AT jajodiasushil trustedrecoveryanddefensiveinformationwarfare |