Malware: fighting malicious code
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
2004
|
Ausgabe: | 2. pr. |
Schriftenreihe: | Prentice Hall series in computer networking and distributed systems
|
Schlagworte: | |
Beschreibung: | XII, 647 S. Ill. |
ISBN: | 0131014056 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019370992 | ||
003 | DE-604 | ||
005 | 20210304 | ||
007 | t | ||
008 | 040823s2004 a||| |||| 00||| eng d | ||
020 | |a 0131014056 |9 0-13-101405-6 | ||
035 | |a (OCoLC)53287882 | ||
035 | |a (DE-599)BVBBV019370992 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-522 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Skoudis, Ed |e Verfasser |4 aut | |
245 | 1 | 0 | |a Malware |b fighting malicious code |c Ed Skoudis |
250 | |a 2. pr. | ||
264 | 1 | |a Upper Saddle River, NJ |b Prentice Hall Professional Technical Reference |c 2004 | |
300 | |a XII, 647 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Prentice Hall series in computer networking and distributed systems | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Computervirussen |2 gtt | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Malware (Computer software) | |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-012834426 |
Datensatz im Suchindex
_version_ | 1804132810160603136 |
---|---|
any_adam_object | |
author | Skoudis, Ed |
author_facet | Skoudis, Ed |
author_role | aut |
author_sort | Skoudis, Ed |
author_variant | e s es |
building | Verbundindex |
bvnumber | BV019370992 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
ctrlnum | (OCoLC)53287882 (DE-599)BVBBV019370992 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. pr. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01306nam a2200421 c 4500</leader><controlfield tag="001">BV019370992</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210304 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">040823s2004 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0131014056</subfield><subfield code="9">0-13-101405-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53287882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019370992</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Skoudis, Ed</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware</subfield><subfield code="b">fighting malicious code</subfield><subfield code="c">Ed Skoudis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. pr.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice Hall Professional Technical Reference</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 647 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Prentice Hall series in computer networking and distributed systems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computervirussen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012834426</subfield></datafield></record></collection> |
id | DE-604.BV019370992 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:58:44Z |
institution | BVB |
isbn | 0131014056 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-012834426 |
oclc_num | 53287882 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-522 |
owner_facet | DE-91G DE-BY-TUM DE-522 |
physical | XII, 647 S. Ill. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Prentice Hall Professional Technical Reference |
record_format | marc |
series2 | Prentice Hall series in computer networking and distributed systems |
spelling | Skoudis, Ed Verfasser aut Malware fighting malicious code Ed Skoudis 2. pr. Upper Saddle River, NJ Prentice Hall Professional Technical Reference 2004 XII, 647 S. Ill. txt rdacontent n rdamedia nc rdacarrier Prentice Hall series in computer networking and distributed systems Computerbeveiliging gtt Computervirussen gtt Databescherming gtt Computer crimes Computer networks Security measures Computer security Malware (Computer software) Malware (DE-588)4687059-3 gnd rswk-swf Malware (DE-588)4687059-3 s DE-604 |
spellingShingle | Skoudis, Ed Malware fighting malicious code Computerbeveiliging gtt Computervirussen gtt Databescherming gtt Computer crimes Computer networks Security measures Computer security Malware (Computer software) Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4687059-3 |
title | Malware fighting malicious code |
title_auth | Malware fighting malicious code |
title_exact_search | Malware fighting malicious code |
title_full | Malware fighting malicious code Ed Skoudis |
title_fullStr | Malware fighting malicious code Ed Skoudis |
title_full_unstemmed | Malware fighting malicious code Ed Skoudis |
title_short | Malware |
title_sort | malware fighting malicious code |
title_sub | fighting malicious code |
topic | Computerbeveiliging gtt Computervirussen gtt Databescherming gtt Computer crimes Computer networks Security measures Computer security Malware (Computer software) Malware (DE-588)4687059-3 gnd |
topic_facet | Computerbeveiliging Computervirussen Databescherming Computer crimes Computer networks Security measures Computer security Malware (Computer software) Malware |
work_keys_str_mv | AT skoudised malwarefightingmaliciouscode |