Introduction to computer security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Harlow
Pearson Professional Education
2004
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 747 S. |
ISBN: | 0321247442 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022507343 | ||
003 | DE-604 | ||
005 | 20091120 | ||
007 | t | ||
008 | 070711s2004 |||| 00||| eng d | ||
020 | |a 0321247442 |9 0-321-24744-2 | ||
035 | |a (OCoLC)634630025 | ||
035 | |a (DE-599)BVBBV022507343 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
100 | 1 | |a Bishop, Matt |e Verfasser |0 (DE-588)129811564 |4 aut | |
245 | 1 | 0 | |a Introduction to computer security |c Matt Bishop |
264 | 1 | |a Harlow |b Pearson Professional Education |c 2004 | |
300 | |a 747 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 1 | 1 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015714308&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015714308 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136608733069312 |
---|---|
adam_text | Contents
Preface
Goals......................................................xxvi
Philosophy
Organization
Differences Between this Book and Computer Security:
Art and Science
Special Acknowledgment
Acknowledgments
Chapter
1.1
1.1.1
1.1.2
1.1.3
1.2
1.3
1.3.1
1.4
1.5
1.5.1
1.5.2
1.5.3
1.6
1.6.1
1.6.2
1.6.3
1.7
1.7.1
1.7.2
1.8
1.9
1.10
1.11
Chapter
2.1
2.2
2.3
2.3.1
2.4
2.5
2.6
Chapter
3.1
3.2
3.3
3.4
3.5
Chapter
4.1
4.2
4.3
4.4
4.5
4.5.1
4.5.2
4.5.2.1
4.5.2.2
4.5.2.3
4.6
4.7
4.8
Chapter
5.1
5.2
5.2.1
5.2.2
5.2.2.1
5.2.2.2
5.3
5.4
5.5
Chapter
6.1
6.2
6.3
6.3.1
6.3.2
6.3.3
6.4
6.5
6.6
Chapter
7.1
7.1.1
7.1.2
7.2
7.2.1
7.3
7.4
7.5
7.6
7.7
Chapter
8.1
8.2
8.2.1
8.2.2
8.2.2.1
8.2.2.2
8.2.3
8.2.4
8.3
8.3.1
8.4
8.4.1
8.5
8.6
8.7
Chapter
9.1
9.2
9.2.1
9.2.2 Kerberos.........................................128
9.2.3
Authentication
9.3
9.3.1
9.3.1.1
9.3.1.2
9.3.2
9.4
9.4.1
9.4.2
9.5
9.5.1
9.5.2
9.6
9.7
9.8
Chapter
10.1
10.1.1
10.1.2
10.1.3
10.1.4
10.2
10.2.1
10.2.1.1
10.2.1.2
10.2.2
10.2.2.1
10.3
10.4
10.4.1
10.4.1.1
10.4.1.2
10.4.1.3
10.4.1.4
10.4.2
10.4.2.1
10.4.2.2
10.4.2.3
10.4.3
10.5
10.6
10.7
Chapter
11.1
11.2
11.2.1
11.2.2
11.2.2.1
11.2.2.2
Passwords
11.2.2.3
11.2.2.4
11.2.2.5
11.2.3
11.3
11.3.1
11.3.2
11.3.3
11.3.4
11.4
11.4.1
11.4.2
11.4.3
11.4.4
11.4.5
11.4.6
11.4.7
11.5
11.6
11.7
11.8
11.9
Chapter
12.1
12.2
12.2.1
12.2.2
12.2.3
12.2.4
12.2.5
12.2.6
12.2.7
12.2.8
12.3
12.4
12.5
Chapter
13.1
13.2
13.3
13.4
13.5
13.5.1
13.5.2
13.6
13.6.1
13.6.1.1
13.6.1.2
13.6.2
13.6.3
13.6.3.1
13.7
13.8
13.9
Chapter
14.1
14.1.1
14.1.2
14.1.2.1
14.1.2.2
14.1.2.3
14.1.2.4
14.1.2.5
14.1.3
14.1.4
14.2
14.2.1
14.2.2
14.2.3
14.2.4
14.2.5
14.3
14.3.1
14.4
14.5
14.6
14.7
14.8
Chapter
15.1
15.1.1
15.2
15.2.1
15.2.2
15.2.2.1
15.2.2.2
15.2.2.3
15.2.2.4
15.2.2.5
15.2.2.6
15.2.3
15.2.4
15.2.5
15.3
15.3.1
15.3.2
15.4
15.4.1
15.4.2
15.5
15.6
15.7
Chapter
16.1
16.2
16.2.1
16.2.2
16.3
16.3.1
16.3.2
16.4
16.5
16.6
Chapter
17.1
17.1.1
17.1.2
17.1.3
17.2
17.2.1
17.2.1.1
17.2.1.2
17.2.1.3
17.2.1.4
П.
17.2.2.1
17.2.2.2
17.2.2.3
17.2.2.4
17.2.2.5
17.2.2.6
17.2.3
17.2.3.1
17.2.3.2
17.2.3.3
17.2.3.4
17.2.3.5
17.3
17.4
17.5
17.6
Contents xv
Chapter
18.1
18.1.1
18.1.2
18.2
18.2.1
18.2.1.1
18.2.1.2
18.2.2
18.2.3
18.2.4
18.2.4.1
18.2.4.2
18.2.4.3
18.3
18.3.1
18.3.2
18.3.3
18.4
18.4.1
18.4.2
18.4.3
18.4.4
18.4.5
18.4.6
18.4.7
18.4.8
18.4.8.1
18.4.8.2
18.4.8.3
18.4.8.4
18.4.8.5
18.4.8.6
18.5
18.5.1
18.5.2
18.6
18.7
18.8
Chapter
19.1
19.2
19.3
19.3.1
19.3.2
19.3.3
19.3.4 TSR
19.3.5
19.3.6
19.3.7
19.3.8
19.4
19.5
19.5.1
19.5.2
19.6
19.6.1
19.6.2
19.6.2.1
19.6.2.2
19.6.2.3
19.6.3
by Sharing
19.6.4
19.6.5
Specification
19.6.5.1
19.6.6
19.6.7
19.7
19.8
19.9
Chapter
20.1
20.2
20.2.1
20.2.2
20.2.3
20.2.4
20.2.4.1
20.2.4.2
20.2.4.3
20.2.4.4
20.2.5
20.2.6
20.2.7
20.2.8
20.2.9
20.2.10
20.2.11
20.3
20.3.1
20.4
20.4.1
20.4.1.1
20.4.1.2
20.4.2
20.4.2./
20.4.2.2
20.4.3
20.4.3.1
20.4.3.2
20.4.4
20.4.4.1
20.4.4.2
20.4.5
20.4.5.1
20.4.5.2
20.4.5.3
20.6
20.7
Chapter
21.1
21.2
21.2.1
21.2.2
21.2.3
21.3
21.3.1
21.3.2
21.3.3
21.3.4
21.4
21.4.1
21.4.1.1
21.4.1.2
21.4.2
21.5
21.5.1
21.5.2
21.6
21.6.1
21.6.2
21.6.3
21.7
21.8
21.9
21.10
Chapter
22.1
22.2
22.3
22.3.1
22.3.2
22.3.3
22.3.4
22.4
22.4.1
22.4.1.1
22.4.1.2
22.4.1.3
22.4.2
22.4.3
22.5
22.5.1
22.5.2
22.5.3
22.6
22.6.1
22.6.2
22.6.2.1
22.6.2.2
22.6.2.3
22.9
Chapter
23.1
23.2
23.2.1
23.2.2
23.2.3
23.2.4
23.3
23.3.1
23.3.2
23.3.2.1
23.3.2.2
23.3.3
23.3.3.1
23.3.3.2
23.3.3.3
23.3.3.4
23.3.3.5
23.3.4
23.3.5
23.4
23.4.1
23.4.2
23.5
23.6
23.7
23.8
Chapter
24.1
24.2
24.2.1
24.2.2
24.2.3
24.2.4
24.3
24.3.1
24.3.2
24.3.3
24.4
24.4.1
24.4.2
24.4.3
24.5
24.5.1
24.5.2
24.5.3
24.6
24.6.1
24.6.2
24.6.3
24.7
24.7.1
24.7.2
24.7.3
24.8
24.8.1
24.8.2
24.9
24.10
24.11
Chapter
25.1
25.2
25.2.1
25.2.2
25.2.2.1
25.2.3
25.3
25.3.1
25.3.1.1
25.3.1.2
25.3.1.3
25.3.2
25.3.2.1
25.3.2.2
25.3.2.3
25.4
25.4.1
25.4.2
25.4.3
25.4.4
25.4.5
25.4.6
25.5
25.5.1
25.5.2
25.5.3
25.6
25.7
25.8
Chapter
26.1
26.2
26.2.1
26.2.2
26.2.2.1
Accounts
26.2.2.2
Accounts
26.2.2.3
26.3
26.3.1
26.3.1.1
26.3.1.2
26.3.2
26.3.2.1
26.3.2.2
26.3.2.3
26.4
26.4.1
26.4.2
26.4.3
26.4.3.1
26.4.3.2
26.4,3.3
Routines
26.4.4
26.5
26.5.1
26.5.1.1
26.5.1.2
26.5.1.3
26.5.1.4
26.5.2
26.5.2.1
26.5.2.2
26.5.2.3
Process
26.5.3
26.5.3.1
26.5.3.2
26.5.3.3
26.5.4
26.5.5
26.5.6
26.5.6.1
26.5.6.2
26.5.6.3
26.5.6.4
26.5.6.5
26.5.6.6
26.5.7
26.5.8
26.5.9
26.5.10
26.6
26.6.1
26.6.1.1
26.6.2
26.6.3
26.7
26.8
26.9
26.10
26.11
Contents xxiii
Chapter
27.1
27.2
27.3
Chapter
Euclidean Algorithm
28.1
28.2
28.3
28.4
28.5
Chapter
29.1
29.2
29.2.1
29.2.2
29.2.3
29.3
Bibliography
Index
|
adam_txt |
Contents
Preface
Goals.xxvi
Philosophy
Organization
Differences Between this Book and Computer Security:
Art and Science
Special Acknowledgment
Acknowledgments
Chapter
1.1
1.1.1
1.1.2
1.1.3
1.2
1.3
1.3.1
1.4
1.5
1.5.1
1.5.2
1.5.3
1.6
1.6.1
1.6.2
1.6.3
1.7
1.7.1
1.7.2
1.8
1.9
1.10
1.11
Chapter
2.1
2.2
2.3
2.3.1
2.4
2.5
2.6
Chapter
3.1
3.2
3.3
3.4
3.5
Chapter
4.1
4.2
4.3
4.4
4.5
4.5.1
4.5.2
4.5.2.1
4.5.2.2
4.5.2.3
4.6
4.7
4.8
Chapter
5.1
5.2
5.2.1
5.2.2
5.2.2.1
5.2.2.2
5.3
5.4
5.5
Chapter
6.1
6.2
6.3
6.3.1
6.3.2
6.3.3
6.4
6.5
6.6
Chapter
7.1
7.1.1
7.1.2
7.2
7.2.1
7.3
7.4
7.5
7.6
7.7
Chapter
8.1
8.2
8.2.1
8.2.2
8.2.2.1
8.2.2.2
8.2.3
8.2.4
8.3
8.3.1
8.4
8.4.1
8.5
8.6
8.7
Chapter
9.1
9.2
9.2.1
9.2.2 Kerberos.128
9.2.3
Authentication
9.3
9.3.1
9.3.1.1
9.3.1.2
9.3.2
9.4
9.4.1
9.4.2
9.5
9.5.1
9.5.2
9.6
9.7
9.8
Chapter
10.1
10.1.1
10.1.2
10.1.3
10.1.4
10.2
10.2.1
10.2.1.1
10.2.1.2
10.2.2
10.2.2.1
10.3
10.4
10.4.1
10.4.1.1
10.4.1.2
10.4.1.3
10.4.1.4
10.4.2
10.4.2.1
10.4.2.2
10.4.2.3
10.4.3
10.5
10.6
10.7
Chapter
11.1
11.2
11.2.1
11.2.2
11.2.2.1
11.2.2.2
Passwords
11.2.2.3
11.2.2.4
11.2.2.5
11.2.3
11.3
11.3.1
11.3.2
11.3.3
11.3.4
11.4
11.4.1
11.4.2
11.4.3
11.4.4
11.4.5
11.4.6
11.4.7
11.5
11.6
11.7
11.8
11.9
Chapter
12.1
12.2
12.2.1
12.2.2
12.2.3
12.2.4
12.2.5
12.2.6
12.2.7
12.2.8
12.3
12.4
12.5
Chapter
13.1
13.2
13.3
13.4
13.5
13.5.1
13.5.2
13.6
13.6.1
13.6.1.1
13.6.1.2
13.6.2
13.6.3
13.6.3.1
13.7
13.8
13.9
Chapter
14.1
14.1.1
14.1.2
14.1.2.1
14.1.2.2
14.1.2.3
14.1.2.4
14.1.2.5
14.1.3
14.1.4
14.2
14.2.1
14.2.2
14.2.3
14.2.4
14.2.5
14.3
14.3.1
14.4
14.5
14.6
14.7
14.8
Chapter
15.1
15.1.1
15.2
15.2.1
15.2.2
15.2.2.1
15.2.2.2
15.2.2.3
15.2.2.4
15.2.2.5
15.2.2.6
15.2.3
15.2.4
15.2.5
15.3
15.3.1
15.3.2
15.4
15.4.1
15.4.2
15.5
15.6
15.7
Chapter
16.1
16.2
16.2.1
16.2.2
16.3
16.3.1
16.3.2
16.4
16.5
16.6
Chapter
17.1
17.1.1
17.1.2
17.1.3
17.2
17.2.1
17.2.1.1
17.2.1.2
17.2.1.3
17.2.1.4
П.
17.2.2.1
17.2.2.2
17.2.2.3
17.2.2.4
17.2.2.5
17.2.2.6
17.2.3
17.2.3.1
17.2.3.2
17.2.3.3
17.2.3.4
17.2.3.5
17.3
17.4
17.5
17.6
Contents xv
Chapter
18.1
18.1.1
18.1.2
18.2
18.2.1
18.2.1.1
18.2.1.2
18.2.2
18.2.3
18.2.4
18.2.4.1
18.2.4.2
18.2.4.3
18.3
18.3.1
18.3.2
18.3.3
18.4
18.4.1
18.4.2
18.4.3
18.4.4
18.4.5
18.4.6
18.4.7
18.4.8
18.4.8.1
18.4.8.2
18.4.8.3
18.4.8.4
18.4.8.5
18.4.8.6
18.5
18.5.1
18.5.2
18.6
18.7
18.8
Chapter
19.1
19.2
19.3
19.3.1
19.3.2
19.3.3
19.3.4 TSR
19.3.5
19.3.6
19.3.7
19.3.8
19.4
19.5
19.5.1
19.5.2
19.6
19.6.1
19.6.2
19.6.2.1
19.6.2.2
19.6.2.3
19.6.3
by Sharing
19.6.4
19.6.5
Specification
19.6.5.1
19.6.6
19.6.7
19.7
19.8
19.9
Chapter
20.1
20.2
20.2.1
20.2.2
20.2.3
20.2.4
20.2.4.1
20.2.4.2
20.2.4.3
20.2.4.4
20.2.5
20.2.6
20.2.7
20.2.8
20.2.9
20.2.10
20.2.11
20.3
20.3.1
20.4
20.4.1
20.4.1.1
20.4.1.2
20.4.2
20.4.2./
20.4.2.2
20.4.3
20.4.3.1
20.4.3.2
20.4.4
20.4.4.1
20.4.4.2
20.4.5
20.4.5.1
20.4.5.2
20.4.5.3
20.6
20.7
Chapter
21.1
21.2
21.2.1
21.2.2
21.2.3
21.3
21.3.1
21.3.2
21.3.3
21.3.4
21.4
21.4.1
21.4.1.1
21.4.1.2
21.4.2
21.5
21.5.1
21.5.2
21.6
21.6.1
21.6.2
21.6.3
21.7
21.8
21.9
21.10
Chapter
22.1
22.2
22.3
22.3.1
22.3.2
22.3.3
22.3.4
22.4
22.4.1
22.4.1.1
22.4.1.2
22.4.1.3
22.4.2
22.4.3
22.5
22.5.1
22.5.2
22.5.3
22.6
22.6.1
22.6.2
22.6.2.1
22.6.2.2
22.6.2.3
22.9
Chapter
23.1
23.2
23.2.1
23.2.2
23.2.3
23.2.4
23.3
23.3.1
23.3.2
23.3.2.1
23.3.2.2
23.3.3
23.3.3.1
23.3.3.2
23.3.3.3
23.3.3.4
23.3.3.5
23.3.4
23.3.5
23.4
23.4.1
23.4.2
23.5
23.6
23.7
23.8
Chapter
24.1
24.2
24.2.1
24.2.2
24.2.3
24.2.4
24.3
24.3.1
24.3.2
24.3.3
24.4
24.4.1
24.4.2
24.4.3
24.5
24.5.1
24.5.2
24.5.3
24.6
24.6.1
24.6.2
24.6.3
24.7
24.7.1
24.7.2
24.7.3
24.8
24.8.1
24.8.2
24.9
24.10
24.11
Chapter
25.1
25.2
25.2.1
25.2.2
25.2.2.1
25.2.3
25.3
25.3.1
25.3.1.1
25.3.1.2
25.3.1.3
25.3.2
25.3.2.1
25.3.2.2
25.3.2.3
25.4
25.4.1
25.4.2
25.4.3
25.4.4
25.4.5
25.4.6
25.5
25.5.1
25.5.2
25.5.3
25.6
25.7
25.8
Chapter
26.1
26.2
26.2.1
26.2.2
26.2.2.1
Accounts
26.2.2.2
Accounts
26.2.2.3
26.3
26.3.1
26.3.1.1
26.3.1.2
26.3.2
26.3.2.1
26.3.2.2
26.3.2.3
26.4
26.4.1
26.4.2
26.4.3
26.4.3.1
26.4.3.2
26.4,3.3
Routines
26.4.4
26.5
26.5.1
26.5.1.1
26.5.1.2
26.5.1.3
26.5.1.4
26.5.2
26.5.2.1
26.5.2.2
26.5.2.3
Process
26.5.3
26.5.3.1
26.5.3.2
26.5.3.3
26.5.4
26.5.5
26.5.6
26.5.6.1
26.5.6.2
26.5.6.3
26.5.6.4
26.5.6.5
26.5.6.6
26.5.7
26.5.8
26.5.9
26.5.10
26.6
26.6.1
26.6.1.1
26.6.2
26.6.3
26.7
26.8
26.9
26.10
26.11
Contents xxiii
Chapter
27.1
27.2
27.3
Chapter
Euclidean Algorithm
28.1
28.2
28.3
28.4
28.5
Chapter
29.1
29.2
29.2.1
29.2.2
29.2.3
29.3
Bibliography
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Bishop, Matt |
author_GND | (DE-588)129811564 |
author_facet | Bishop, Matt |
author_role | aut |
author_sort | Bishop, Matt |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV022507343 |
classification_rvk | ST 276 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)634630025 (DE-599)BVBBV022507343 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02249nam a2200541 c 4500</leader><controlfield tag="001">BV022507343</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091120 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070711s2004 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321247442</subfield><subfield code="9">0-321-24744-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)634630025</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022507343</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bishop, Matt</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)129811564</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to computer security</subfield><subfield code="c">Matt Bishop</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Harlow</subfield><subfield code="b">Pearson Professional Education</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">747 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015714308&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015714308</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV022507343 |
illustrated | Not Illustrated |
index_date | 2024-07-02T17:58:03Z |
indexdate | 2024-07-09T20:59:06Z |
institution | BVB |
isbn | 0321247442 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015714308 |
oclc_num | 634630025 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 747 S. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Pearson Professional Education |
record_format | marc |
spelling | Bishop, Matt Verfasser (DE-588)129811564 aut Introduction to computer security Matt Bishop Harlow Pearson Professional Education 2004 747 S. txt rdacontent n rdamedia nc rdacarrier Kryptologie (DE-588)4033329-2 gnd rswk-swf Anwendungssoftware (DE-588)4120906-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Anwendungssoftware (DE-588)4120906-0 s Softwareentwicklung (DE-588)4116522-6 s 2\p DE-604 Kryptologie (DE-588)4033329-2 s 3\p DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015714308&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bishop, Matt Introduction to computer security Kryptologie (DE-588)4033329-2 gnd Anwendungssoftware (DE-588)4120906-0 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4120906-0 (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4116522-6 (DE-588)4070085-9 |
title | Introduction to computer security |
title_auth | Introduction to computer security |
title_exact_search | Introduction to computer security |
title_exact_search_txtP | Introduction to computer security |
title_full | Introduction to computer security Matt Bishop |
title_fullStr | Introduction to computer security Matt Bishop |
title_full_unstemmed | Introduction to computer security Matt Bishop |
title_short | Introduction to computer security |
title_sort | introduction to computer security |
topic | Kryptologie (DE-588)4033329-2 gnd Anwendungssoftware (DE-588)4120906-0 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Softwareentwicklung (DE-588)4116522-6 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Kryptologie Anwendungssoftware Computersicherheit Datensicherung Softwareentwicklung Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015714308&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bishopmatt introductiontocomputersecurity |