EC2ND 2006: proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
London
Springer
2007
|
Schlagworte: | |
Online-Zugang: | BTU01 FHM01 UBG01 UBY01 UBR01 Volltext |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (VII, 125 S.) 24 cm |
ISBN: | 9781846287503 |
DOI: | 10.1007/978-1-84628-750-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV036502262 | ||
003 | DE-604 | ||
005 | 20100616 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 100615s2007 xxk|||| o||u| ||||||eng d | ||
010 | |a 2007390533 | ||
020 | |a 9781846287503 |c online |9 978-1-84628-750-3 | ||
024 | 7 | |a 10.1007/978-1-84628-750-3 |2 doi | |
035 | |a (OCoLC)255431696 | ||
035 | |a (DE-599)BVBBV036502262 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-473 |a DE-M347 |a DE-706 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
111 | 2 | |a EC2ND |n 2 |d 2006 |c Pontypridd |j Verfasser |0 (DE-588)10165964-7 |4 aut | |
245 | 1 | 0 | |a EC2ND 2006 |b proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis |c Andrew Blyth and Iain Sutherland (eds.) ; Faculty of Advanced Technology, University of Glamorgan, Wales, UK |
264 | 1 | |a London |b Springer |c 2007 | |
300 | |a 1 Online-Ressource (VII, 125 S.) |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2006 |z Pontypridd |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Blyth, Andrew |d 1966- |e Sonstige |0 (DE-588)122859243 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-8462-8749-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-8462-8749-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-84628-750-3 |x Verlag |3 Volltext |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-020424645 | ||
966 | e | |u https://doi.org/10.1007/978-1-84628-750-3 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-84628-750-3 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-84628-750-3 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-84628-750-3 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-84628-750-3 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804143067126562816 |
---|---|
any_adam_object | |
author_GND | (DE-588)122859243 |
author_corporate | EC2ND Pontypridd |
author_corporate_role | aut |
author_facet | EC2ND Pontypridd |
author_sort | EC2ND Pontypridd |
building | Verbundindex |
bvnumber | BV036502262 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)255431696 (DE-599)BVBBV036502262 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-84628-750-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02487nmm a2200541zc 4500</leader><controlfield tag="001">BV036502262</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100616 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">100615s2007 xxk|||| o||u| ||||||eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007390533</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781846287503</subfield><subfield code="c">online</subfield><subfield code="9">978-1-84628-750-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-84628-750-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255431696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036502262</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">EC2ND</subfield><subfield code="n">2</subfield><subfield code="d">2006</subfield><subfield code="c">Pontypridd</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)10165964-7</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">EC2ND 2006</subfield><subfield code="b">proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis</subfield><subfield code="c">Andrew Blyth and Iain Sutherland (eds.) ; Faculty of Advanced Technology, University of Glamorgan, Wales, UK</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VII, 125 S.)</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2006</subfield><subfield code="z">Pontypridd</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Blyth, Andrew</subfield><subfield code="d">1966-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)122859243</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-8462-8749-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-8462-8749-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-84628-750-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020424645</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-84628-750-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-84628-750-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-84628-750-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-84628-750-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-84628-750-3</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2006 Pontypridd gnd-content |
genre_facet | Konferenzschrift 2006 Pontypridd |
id | DE-604.BV036502262 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:41:46Z |
institution | BVB |
institution_GND | (DE-588)10165964-7 |
isbn | 9781846287503 |
language | English |
lccn | 2007390533 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020424645 |
oclc_num | 255431696 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-706 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-706 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (VII, 125 S.) 24 cm |
psigel | ZDB-2-SCS |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Springer |
record_format | marc |
spelling | EC2ND 2 2006 Pontypridd Verfasser (DE-588)10165964-7 aut EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Andrew Blyth and Iain Sutherland (eds.) ; Faculty of Advanced Technology, University of Glamorgan, Wales, UK London Springer 2007 1 Online-Ressource (VII, 125 S.) 24 cm txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Computer networks Security measures Congresses Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2006 Pontypridd gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Blyth, Andrew 1966- Sonstige (DE-588)122859243 oth Erscheint auch als Druck-Ausgabe, Paperback 1-8462-8749-9 Erscheint auch als Druck-Ausgabe, Paperback 978-1-8462-8749-7 https://doi.org/10.1007/978-1-84628-750-3 Verlag Volltext |
spellingShingle | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Computer networks Security measures Congresses Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis |
title_auth | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis |
title_exact_search | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis |
title_full | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Andrew Blyth and Iain Sutherland (eds.) ; Faculty of Advanced Technology, University of Glamorgan, Wales, UK |
title_fullStr | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Andrew Blyth and Iain Sutherland (eds.) ; Faculty of Advanced Technology, University of Glamorgan, Wales, UK |
title_full_unstemmed | EC2ND 2006 proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Andrew Blyth and Iain Sutherland (eds.) ; Faculty of Advanced Technology, University of Glamorgan, Wales, UK |
title_short | EC2ND 2006 |
title_sort | ec2nd 2006 proceedings of the second european conference on computer network defence in conjunction with the first workshop on digital forensics and incident analysis |
title_sub | proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis |
topic | Computer networks Security measures Congresses Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks Security measures Congresses Rechnernetz Computersicherheit Konferenzschrift 2006 Pontypridd |
url | https://doi.org/10.1007/978-1-84628-750-3 |
work_keys_str_mv | AT ec2ndpontypridd ec2nd2006proceedingsofthesecondeuropeanconferenceoncomputernetworkdefenceinconjunctionwiththefirstworkshopondigitalforensicsandincidentanalysis AT blythandrew ec2nd2006proceedingsofthesecondeuropeanconferenceoncomputernetworkdefenceinconjunctionwiththefirstworkshopondigitalforensicsandincidentanalysis |