Computer security: art and science
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Munich [u.a.]
Addison-Wesley
2004
|
Ausgabe: | 5. printing |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XLI, 1084 S. |
ISBN: | 0201440997 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV019714386 | ||
003 | DE-604 | ||
005 | 20070227 | ||
007 | t | ||
008 | 050228s2004 xxu |||| 00||| eng d | ||
020 | |a 0201440997 |9 0-201-44099-7 | ||
035 | |a (OCoLC)254711671 | ||
035 | |a (DE-599)BVBBV019714386 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 |a DE-739 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
100 | 1 | |a Bishop, Matt |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer security |b art and science |c Matt Bishop |
250 | |a 5. printing | ||
264 | 1 | |a Boston ; Munich [u.a.] |b Addison-Wesley |c 2004 | |
300 | |a XLI, 1084 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computersicherheit | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013041668&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-013041668 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804133169832656896 |
---|---|
adam_text | Contents
Preface
Goals
Philosophy
Organization
Roadmap
Dependencies
Background
Undergraduate Level
Graduate Level
Practitioners
Special Acknowledgment
Acknowledgments
PART1: INTRODUCTION
Chapter
1.1
1.1.1
1.1.2
1.1.3
1.2
1.3
1.3.1
1.4
1.5
1.5.1
1.5.2
1.5.3
1.6
1.6.1
1.6.2
1.6.3
vii
viii
1.7
1.7.1
1.7.2
1.8
1.9
1.10
1.11
1.12
PART
Chapter
2.1
2.2
2.2.1
2.2.2
2.3
2.3.1
2.4
2.4.1
2.4.2
2.4.3
2.5
2.6
2.7
2.8
Chapter
3.1
3.2
3.3
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.4
3.4.1
3.4.1.1
Contents
3.4.1.2
3.4.1.3
3.4.1.4
3.4.1.5
3.5
3.5.1
3.5.2
3.5.3
3.5.4
3.6
3.7
3.8
3.9
PART
Chapter
4.1
4.2
4.3
4.4
4.5
4.5.1
4.5.2
4.6
4.6.1
4.6.2
4.6.2.1
4.6.2.2
4.6.2.3
4.7
4.8
4.9
4.10
4.11
Chapter
5.1
5.2
Contents
5.2.1
5.2.2
5.2.2.1
5.2.2.2
5.2.3
5.2.3.1
5.2.3.2
5.2.4
5.2.4.1
5.2.4.2
5.3
5.4
5.4.1
5.4.2
5.4.3
5.5
5.6
5.7
5.8
Chapter
6.1
6.2
6.2.1
6.2.2
6.2.3
6.3
6.3.1
6.3.2
6.3.3
6.4
6.4.1
6.4.1.1
6.4.2
6.4.3
6.5
6.6
6.7
6.8
Chapter
7
Contents
7.1.1
7.1.2
7.1.3
7.1.4
7.2
7.2.1
7.3
7.4
7.5
7.6
7.7
7.8
Chapter
8.1
8.1.1
8.2
8.2.1
8.2.2
8.2.3
8.2.4
8.3
8.3.1
8.4
8.4.1
8.5
8.5.1
8.5.2
8.6
8.7
8.8
8.9
PART
Chapter
9.1
9.2
9.2.1
9.2.2
xii
9.2.2.1
9.2.2.2
9.2.3
9.2.4
9.3
9.3.1
9.3.2
9.4
9.4.1
9.5
9.6
9.7
9.8
Chapter
10.1
10.2
10.2.1
10.2.2 Kerberos............................................250
10.2.3
10.3
10.4
10.4.1
10.4.2
10.4.2.1
10.4.2.2
10.4.3
10.5
10.5.1
10.5.1.1
10.5.1.2
10.5.1.3
10.5.1.4
10.5.2
10.6
10.6.1
10.6.2
10.6.2.1
10.6.2.2
10.7
10.8
Contents
10.9
10.10
Chapter
11.1
11.1.1
11.1.2
11.1.3
11.1.4
11.2
11.2.1
11.2.1.1
11.2.1.2
11.2.2
11.2.2.1
11.3
11.4
11.4.1
11.4.1.1
11.4.1.2
11.4.1.3
11.4.1.4
11.4.2
11.4.2.1
11.4.2.2
11.4.2.3
11.4.2.4
J
11.4.2.6
11.4.2.7
11.4.3
11.4.3.1
11.4.3.2
11.4.3.3
11.4.4
11.5
11.6
11.7
11.8
xiv
Chapter
12.1
12.2
12.2.1
12.2.2
12.2.2.1
12.2.2.2
Computer-Generated Passwords
12.2.2.3
12.2.2.4
12.2.2.5
12.2.3
12.3
12.3.1
12.3.2
12.3.3
12.3.4
12.4
12.4.1
12.4.2
12.4.3
12.4.4
12.4.5
12.4.6
12.4.7
12.5
12.6
12.7
12.8
12.9
12.10
PART
Chapter
13.1
13.2
13.2.1
13.2.2
13.2.3
13.2.4
Contents
13.2.5
13.2.6
13.2.7
13.2.8
13.3
13.4
13.5
13.6
Chapter
14.1
14.2
14.3
14.4
14.5
14.5.1
14.5.2
14.5.3
14.6
14.6.1
14.6.1.1
14.6.1.2
14.6.2
14.6.3
14.6.3.1
14.7
14.8
14.9
14.10
Chapter
15.1
15.1.1
15.1.2
15.1.2.1
15.1.2.2
15.1.2.3
15.1.2.4
15.1.2.5
15.1.3
15.1.4
xvi
15.2
15.2.1
15.2.2
15.2.3
15.2.4
15.2.5
15.3
15.3.1
15.3.2
15.4
15.5
15.6
15.7
15.8
15.9
Chapter
16.1
16.1.1
16.1.2
16.2
16.2.1
16.2.2
16.2.3
16.3
16.3.1
16.3.2
163.2.1
163.2.2
163.23
163.2.4
163.2.5
163.2.6
16.3.3
16.3.4
16.3.5
16.4
16.4.1
16.4.2
16.5
16.5.1
16.5.2
Contents
16.6
16.7
16.8
16.9
Chapter
17.1
17.2
17.2.1
17.2.2
17.3
17.3.1
17.3.1.1
17.3.1.2
17.3.1.3
17.3.1.4
17.3.2
17.3.2.1
17.3.2.2
17.3.2.3
17.3.3
17.4
17.5
17.6
17.7
PART
Contributed by Elisabeth Sullivan
Chapter
18.1
18.1.1
18.1.2
18.1.3
18.2
18.2.1
18.2.1.1
18.2.1.2
18.2.1.3
18.2.1.4
xviii
18.2.2
18.2.2.1
18.2.2.2
18.2.2.3
18.2.2.4
18.2.2.5
18.2.2.6
18.2.3
18.2.3.1
18.2.3.2
18.2.3.3
18.2.3.4
18.2.3.5
18.3
18.4
18.5
18.6
Chapter
19.1
19.1.1
19.1.2
19.1.2.1
19.1.2.2
19.1.3
19.1.4
19.2
19.2.1
19.2.2
19.2.2.1
19.2.2.2
19.2.2.3
19.2.2.4
19.2.3
19.2.3.1
19.2.3.2
19.2.3.3
19.2
19.2.4.1
19.2.4.2
19.2.4.3
19.2.4.4
Contents
19.3
19.3.1 Implementation
19.3.2
19.3.3
19.3.3.1
19.3.3.2
19.3.3.2
19.3.3.3
Are Correct
19.4
19.5
19.6
19.7
19.8
Chapter
20.1
20.2
20.3
20.3.1
20.3.1.1
20.3.1.2
20.3.2
20.3.3
20.3.3.1
20.3.3.2
20.4
20.4.1
20.4.1.1
20.4.1.2
20.4.1.3
20.4.2
20.4.2.1
20.4.2.2
20.4.2.3
20.4.3
20.4.3.1
20.4.3.2
20.5
20.6
20.7
20.8
xx
Chapter
21.1
21.1.1
21.1.2
21.2
21.2.1
21.2.1.1
21.2.1.2
21.2.2
21.2.3
21.2.4
21.2.4.1
21.2.4.2
21.2.4.3
21.3
21.3.1
21.3.1.1
21.3.1.2
21.3.2
21.3.3
21.3.4
21.3.4.1
21.3.4.2
21.4
21.4.1
21.4.2
21.5
21.6
21.6.1 FC
21.6.2
21.7
21.7.1
21.7.2
21.7.3
21.8
21.8.1
21.8.2
21.8.3
21.8.4
21.8.5
21.8.6
21.8.7
Contents
21.8.8
21.8.8.1
21.8.8.2
21.8.8.3
21.8.8.4
21.8.8.5
21.8.8.6
21.9
21.9.1
21.9.2
21.10
21.11
21.12
21.13
PART
Chapter
22.1
22.2
22.3
22.3.1
22.3.2
22.3.3
22.3.4 TSR
22.3.5
22.3.6
22.3.7
22.3.8
22.4
22.5
22.5.1
22.5.2
22.6
22.6.1
22.7
22.7.1
22.7.2
22.7.2.1
22.7.2.2
22.7.2.3
xxii
22.7.3
Domain
22.7.4
22.7.5
22.7.5.1
22.7.6
22.7.7
22.8
22.9
22.10
22.11
Chapter
23.1
23.2
23.2.1
23.2.2
23.2.3
23.2.4
23.2.4.1
23.2.4.2
23.2.4.3
23.2.4.4
23.2.5
23.2.6
23.2.7
23.2.8
23.2.9
23.2.10
23.2.11
23.3
23.3.1
23.4
23.4.1
23.4.1.1
23.4.1.2
23.4.2
23.4.2.1
23.4.2.2
23.4.2.3
Contents
23.4.3
23.43.1
23.43.2
23.4.4
23.4.4.1
23.4.4.2
23.4.5
23.4.5.1
23.4.5.2
23.4.53
23.5
23.5.1
23.5.2
23.5.3
23.6
23.7
23.8
23.9
Chapter
24.1
24.2
24.2.1
24.2.2
24.2.3
24.3
24.3.1
24.3.2
24.3.3
24.3.4
24.4
24.4.1
24.4.1.1
24.4.1.2
24.4.2
24.5
24.5.1
24.5.2
24.6
24.6.1
24.6.2
24.6.3
xxiv
24.7
24.8
24.9
24.10
24.11
Chapter
25.1
25.2
25.3
25.3.1
25.3.1.1
25.3.2
25.3.3
25.3.4
25.4
25.4.1
25.4.1.1
25.4.1.2
25.4.1.3
25.4.2
25.4.3
25.5
25.5.1
25.5.2
25.5.3
25.6
25.6.1
25.6.2
25.6.2.1
25.6.2.2
25.6.2.3
25.7
25.8
25.9
25.10
PART
Chapter
26.1
26.2
Contents
26.2.1
26.2.2
26.2.3
26.2.4
26.3
26.3.1
26.3.2
263.2.1
263.2.2
26.3.3
2633.1
2633.2
26333
2633.4
2633.5
26.3.4
26.3.5
26.4
26.4.1
26.4.2
26.5
26.6
26.7
26.8
26.9
Chapter
27.1
27.2
27.2.1
27.2.2
27.2.3
27.2.4
27.3
27.3.1
27.3.2
27.3.3
27.4
27.4.1
27.4.2
27.4.3
xxvi
27.5
27.5.1
27.5.2
27.5.3
27.6
27.6.1
27.6.2
27.6.3
27.7
27.7.1
27.7.2
27.7.3
27.8
27.8.1
27.8.2
27.9
27.10
27.11
27.12
Chapter
28.1
28.2
28.2.1
28.2.2
282.2.1
28.2.3
28.3
28.3.1
28.3.1.1
28.3.1.2
28.3.1.3
28.3.2
28.3.2.1
28.3.2.2
28.3.2.3
28.4
28.4.1
28.4.2
28.4.3
28.4.4
28.4.5
Contents
28.4.6
28.5
28.5.1
28.5.2
28.5.3
28.6
28.7
28.8
28.9
Chapter
29.1
29.2
29.2.1
29.2.2
29.2.2.1
Accessing Role Accounts
29.2.2.2
Accessing Role Accounts
29.2.2.3
29.3
29.3.1
293.1.1
29.3.1.2
29.3.2
29.3.2.1
29.3.2.2
■29.3.2.3
29.4
29.4.1
29.4.2
29.4.3
29.4.3.1
29.4.3.2
29.4.3.3
Matching Routines
29.4.4
29.5
29.5.1
29.5.1.1
29.5.1.2
xxviii
29.5.13
29.5.1.4
29.5.2
29.5.2.1
29.5.2.2
29.5.23
29.5.3
29.53.1
29.53.2
29.53.3
29.5.4
29.5.5
29.5.6
29.5.6.1
29.5.6.2
29.5.63
29.5.6.4
29.5.6.5
29.5.6.6
29.5.7
29.5.8
29.5.9
29.5.10
29.6
29.6.1
29.6.1.1
29.6.2
29.6.3
29.7
29.8
29.9
29.10
29.11
29.12
PART
Chapter
30.1
30.2
30.3
Contents
Chapter
31.1
31.2
31.3
31.4
31.5
Chapter
32.1
32.2
32.3
32.3.1
32.3.2
32.3.3
32.4
Chapter
33.1
33.2
33.2.1
33.2.2
33.2.3
33.3
Chapter
34.1
34.1.1
U.I.
34.1.1.2
34.1.2
34.1.3
34.1.4
34.2
34.2.1
34.3
34.3.1
34.3.2
34.4
Chapter
35.1
xxx
35.1.1
35.1.1.1
35.1.1.2
35.1.1.3
35.1.1.4
35.1.2
35.1.2.1
35.1.2.2
35.1.2.3
35.1.2.4
35.1.2.5
35.1.2.6
35.1.2.7
35.1.2.8
35.1.2.9
35.1.2.10
35.1.2.11
35.1.2.12
to Nonconsensual Access
35.1.3
35.1.3.1
35.1.3.2
35.1.3.3
35.1.4
35.2
35.2.1
35.2.1.1
35.2.1.2
35.2.1.3
35.2.1.4
35.2.2
Bibliography
Index
|
any_adam_object | 1 |
author | Bishop, Matt |
author_facet | Bishop, Matt |
author_role | aut |
author_sort | Bishop, Matt |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV019714386 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 ST 277 |
classification_tum | DAT 050f DAT 460f |
ctrlnum | (OCoLC)254711671 (DE-599)BVBBV019714386 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 5. printing |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01680nam a2200469zc 4500</leader><controlfield tag="001">BV019714386</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070227 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050228s2004 xxu |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201440997</subfield><subfield code="9">0-201-44099-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)254711671</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019714386</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bishop, Matt</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="b">art and science</subfield><subfield code="c">Matt Bishop</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">5. printing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Munich [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XLI, 1084 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013041668&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013041668</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV019714386 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T20:04:27Z |
institution | BVB |
isbn | 0201440997 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013041668 |
oclc_num | 254711671 |
open_access_boolean | |
owner | DE-703 DE-739 DE-83 |
owner_facet | DE-703 DE-739 DE-83 |
physical | XLI, 1084 S. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Bishop, Matt Verfasser aut Computer security art and science Matt Bishop 5. printing Boston ; Munich [u.a.] Addison-Wesley 2004 XLI, 1084 S. txt rdacontent n rdamedia nc rdacarrier Computersicherheit Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Datensicherung (DE-588)4011144-1 s 1\p DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013041668&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bishop, Matt Computer security art and science Computersicherheit Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 |
title | Computer security art and science |
title_auth | Computer security art and science |
title_exact_search | Computer security art and science |
title_full | Computer security art and science Matt Bishop |
title_fullStr | Computer security art and science Matt Bishop |
title_full_unstemmed | Computer security art and science Matt Bishop |
title_short | Computer security |
title_sort | computer security art and science |
title_sub | art and science |
topic | Computersicherheit Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013041668&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bishopmatt computersecurityartandscience |