Computer security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester
Wiley
[2011]
|
Ausgabe: | Third edition |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIX, 436 Seiten Illustrationen |
ISBN: | 9780470741153 0470741155 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036932532 | ||
003 | DE-604 | ||
005 | 20171113 | ||
007 | t | ||
008 | 110112s2011 a||| |||| 00||| eng d | ||
010 | |a 2010036859 | ||
015 | |a GBB075337 |2 dnb | ||
016 | 7 | |a 1002416027 |2 DE-101 | |
020 | |a 9780470741153 |c Broschur : EUR ca. 57.90 (DE) |9 978-0-470-74115-3 | ||
020 | |a 0470741155 |9 0-470-74115-5 | ||
028 | 5 | 2 | |a Bestellnummer: 14574115000 |
035 | |a (OCoLC)706932405 | ||
035 | |a (DE-599)BVBBV036932532 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-11 |a DE-739 |a DE-355 |a DE-Aug4 |a DE-706 |a DE-19 |a DE-634 |a DE-860 |a DE-N2 | ||
050 | 0 | |a QA76.9.A25 | |
050 | 0 | |a QA76.9.A25 G65 2011 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Gollmann, Dieter |0 (DE-588)1132276268 |4 aut | |
245 | 1 | 0 | |a Computer security |c Dieter Gollmann, Hamburg University of Technology |
250 | |a Third edition | ||
264 | 1 | |a Chichester |b Wiley |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a XIX, 436 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3474600&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020847595&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020847595 |
Datensatz im Suchindex
_version_ | 1805095174093668352 |
---|---|
adam_text |
Preface
xvii
CHAPTERI
-
History of Computer Security
1
1.1
The Dawn of Computer Security
2
3
4
5
6
6
8
10
11
13
14
15
16
17
19
21
22
23
24
24
26
26
28
2.4
Further Reading
29
2.5
Exercises
29
CHAPTERS- Foundations of Computer Security
31
3.1
Definitions
32
3.1.1
Security
32
3.1.2
Computer Security
34
3.1.3
Confidentiality
34
3.1.4
Integrity
35
3.1.5
Availability
36
3.1.6
Accountability
37
3.1.7
Non-repudiation
38
1.2
1970s-
Mainframes
1.3
1980s-
Personal Computers
1.3.1
An Early Worm
1.3.2
The Mad Hacker
1.4
1990s -
Internet
1.5
2000s
-
The Web
1.6
Conclusions
-
The Benefits of Hindsight
1.7
Exercises
CH
APTER2
-
Managing Security
2.1
Attacks
and Attackers
2.2
Security
Management
2.2.1
Security Policies
2.2.2
Measuring Security
2.2.3
Standards
2.3
Risk and Threat Analysis
2.3.1
Assets
2.3.2
Threats
2.3.3
Vulnerabilities
2.3.4
Attacks
2.3.5
Common Vulnerability Scoring System
2.3.6
Quantitative and Qualitative Risk Analysis
2.3.7
Countermeasures
-
Risk Mitigation
CONTENTS
3.1.8
Reliability
38
3.1.9
Our Definition
39
3.2
The Fundamental Dilemma of Computer Security
40
3.3
Data vs Information
40
3.4
Principles of Computer Security
41
3.4.1
Focus of Control
42
3.4.2
The Man-Machine Scale
42
3.4.3
Complexity vs Assurance
44
3.4.4
Centralized or Decentralized Controls
44
3.5
The Layer Below
45
3.6
The Layer Above
47
3.7
Further Reading
47
3.8
Exercises
48
CHAPTER4- Identification and Authentication
49
4.1 Username
and Password
50
4.2
Bootstrapping Password Protection
51
4.3
Guessing Passwords
52
4.4
Phishing, Spoofing, and Social Engineering
54
4.4.1
Password Caching
55
4.5
Protecting the Password File
56
4.6
Single Sign-on
58
4.7
Alternative Approaches
59
4.8
Further Reading
63
4.9
Exercises
63
CHAPTERS- Access Control
65
5.1
Background
66
5.2
Authentication and Authorization
66
5.3
Access Operations
68
5.3.1
Access Modes
68
5.3.2
Access Rights of the Bell-LaPadula Model
68
5.3.3
Administrative Access Rights
70
5.4
Access Control Structures
71
5.4.1
Access Control Matrix
71
5.4.2
Capabilities
72
5.4.3
Access Control Lists
72
5.5
Ownership
73
5.6
Intermediate Controls
74
5.6.1
Groups and Negative Permissions
74
5.6.2
Privileges
75
5.6.3
Role-Based Access Control
76
5.6.4
Protection Rings
78
CONTENTS
5.7
Policy Instantiation
79
5.8
Comparing Security Attributes
79
5.8.1
Partial
Orderings
79
5.8.2
Abilities in the VSTa Microkernel
80
5.8.3
Lattice of Security Levels
81
5.8.4
Multi-level Security
82
5.9
Further Reading
84
5.10
Exercises
84
CHAPTER
6 -
Reference Monitors
87
6.1
Introduction
88
6.1.1
Placing the Reference Monitor
89
6.1.2
Execution Monitors
90
6.2
Operating System Integrity
90
6.2.1
Modes of Operation
91
6.2.2
Controlled Invocation
91
6.3
Hardware Security Features
91
6.3.1
Security Rationale
92
6.3.2
A Brief Overview of Computer Architecture
92
6.3.3
Processes and Threads
95
6.3.4
Controlled Invocation
-
Interrupts
95
6.3.5
Protection on the Intel
80386/80486 96
6.3.6
The Confused Deputy Problem
98
6.4
Protecting Memory
99
6.4.1
Secure Addressing
100
6.5
Further Reading
103
6.6
Exercises
104
CHAPTER
7 -
Unix Security 1Q7
7.1
Introduction
108
7.1.1
Unix Security Architecture
109
7.2
Principals
109
7.2.1
User Accounts
110
7.2.2
Superuser
(Root)
110
7.2.3
Groups 111
7.3
Subjects 111
7.3.1
Login and Passwords
112
7.3.2
Shadow Password File
113
7.4
Objects
113
7.4.1
Thelnode
113
7.4.2
Default Permissions
114
7.4.3
Permissions for Directories
115
7.5
Access
Control
116
7.5.1
Set UserlD and Set
GroupID
117
7.5.2
Changing Permissions
118
7.5.3
Limitations of Unix Access Control
119
7.6
Instances of General Security Principles
119
7.6.1
Applying Controlled Invocation
119
7.6.2
Deleting Files
120
7.6.3
Protection of Devices
120
7.6.4
Changing the Root of the
Filesystem
121
7.6.5
Mounting
Filesystems
122
7.6.6
Environment Variables
122
7.6.7
Searchpath
123
7.6.8
Wrappers
124
7.7
Management Issues
125
7.7.1
Managing the
Superuser
125
7.7.2
Trusted Hosts
126
7.7.3
Audit Logs and Intrusion Detection
126
7.7.4
Installation and Configuration
127
7.8
Further Reading
128
7.9
Exercises
128
CHAPTERS-Windows Security
131
8.1
Introduction
132
8.1.1
Architecture
132
8.1.2
The Registry
133
8.1.3
Domains
134
8.2
Components of Access Control
135
8.2.1
Principals
135
8.2.2
Subjects
137
8.2.3
Permissions
139
8.2.4
Objects
141
8.3
Access Decisions
142
8.3.1
The DACL
143
8.3.2
Decision Algorithm
144
8.4
Managing Policies
145
8.4.1
Property Sets
145
8.4.2
ACE Inheritance
145
8.5
Task-Dependent Access Rights
147
8.5.1
Restricted Tokens
148
8.5.2
User Account Control
149
8.6
Administration
150
8.6.1
User Accounts
150
8.6.2
Default User Accounts
150
8.6.3
Audit
8.6.4
Summary
8.7
Further Reading
8.8
Exercises
CHAPTER9-
■
Database Security
9.1
Introduction
9.2
Relational Databases
9.2.1
Database Keys
9.2.2
Integrity Rules
9.3
Access Control
9.3.1
The SQL Security Model
9.3.2
Granting and Revocation of Privileges
9.3.3
Access Control through Views
9.4
Statistica
1
Database Security
9.4.1
Aggregation and Inference
9.4.2
Tracker Attacks
9.4.3
Countermeasures
9.5
Integration with the Operating System
9.6
Privacy
9.7
Further Reading
9.8
Exercises
CHA
PTER
10
-
Software Security
10.1
Introduction
10.1.1
Security and Reliability
10.1.2
Malware
Taxonomy
10.1.3
Hackers
10.1.4
Change in Environment
10.1.5
Dangers of Abstraction
10.2
Characters and Numbers
10.2.1
Characters (UTF-8 Encoding)
10.2.2
The rlogin Bug
10.2.3
Integer Overflows
10.3
Canonical Representations
10.4
Memory
Management
10.4.1
Buffer Overruns
10.4.2
Stack Overruns
10.4.3
Heap Overruns
10.4.4
Double-Free Vulnerabilities
10.4.5
Type Confusion
10.5
Data and
Code
10.5.1
Scripting
10.5.2
SQL Injection
152
152
153
153
155
156
158
160
161
162
163
163
164
167
168
169
170
172
173
175
175
177
178
178
178
178
179
179
179
179
181
181
183
184
185
186
187
187
189
191
191
192
193
194
194
195
195
195
197
197
197
199
200
201
201
202
205
206
206
207
208
210
210
211
212
213
214
214
216
216
CHAPTER
12
-Security
Models 219
12.1
The
Biba
Model
220
12.1.1
Static Integrity Levels
220
12.1.2
Dynamic Integrity Levels
220
12.1.3
Policies for Invocation
221
12.2
Chinese Wall Model
221
12.3
The Clark-Wilson Model
223
12.4
The Harrison-Ruzzo-Ullman Model
225
12.5
Information-Flow Models
228
12.5.1
Entropy and Equivocation
228
12.5.2
A Lattice-Based Model
229
12.6
Execution Monitors
230
12.6.1
Properties of Executions
231
12.6.2
Safety and Liveness
232
10.6
Race Conditions
10.7
Defences
10.7.1
Prevention: Hardware
10.7.2
Prevention: Modus
Operandi
10.7.3
Prevention: Safer Functions
10.7.4
Prevention: Filtering
10.7.5
Prevention: Type Safety
10.7.6
Detection: Canaries
10.7.7
Detection: Code Inspection
10.7.8
Detection: Testing
10.7.9
Mitigation: Least Privilege
10.7.10
Reaction: Keeping Up to Date
10.8
Further Reading
10.9
Exercises
CHA
PTER
11
-
Bell-LaPadula Model
11.1
State Machine Models
11.2
The Bell-LaPadula Model
11.2.1
The State Set
11.2.2
Security Policies
11.2.3
The Basic Security Theorem
11.2.4
Tranquility
11.2.5
Aspects and Limitations of BLP
11.3
The
Multics
Interpretation of BLP
11.3.1
Subjects and Objects in
Multics
11.3.2
Translating the BLP Policies
11.3.3
Checking the Kernel Primitives
11.4
Further Reading
11.5
Exercises
12.7
Further Reading
12.8
Exercises
CHA
PT
E R
13 -
Security Evaluation
13.1
Introduction
13.2
The Orange Book
13.3
The Rainbow Series
13.4
Information Technology Security Evaluation Criteria
13.5
The Federal Criteria
13.6
The Common Criteria
13.6.1
Protection Profiles
13.6.2
Evaluation Assurance Levels
13.6.3
Evaluation Methodology
13.6.4
Re-evaluation
13.7
Quality Standards
13.8
An Effort Well Spent?
13.9
Summary
232
233
235
236
239
241
242
243
243
244
245
246
246
246
247
248
13.10
Further Reading
248
13.11
Exercises
249
CHAPTER
14
-Cryptography
251
14.1
Introduction
252
14.1.1
The Old Paradigm
252
14.1.2
New Paradigms
253
14.1.3
Cryptographic Keys
254
14.1.4
Cryptography in Computer Security
255
14.2
Modular Arithmetic
256
14.3
Integrity Check Functions
25,7
14.3.1
Collisions and the Birthday Paradox
257
14.3.2
Manipulation Detection Codes
257
14.3.3
Message Authentication Codes
259
14.3.4
Cryptographic Hash Functions
259
14.4
Digital Signatures
260
14.4.1
One-Time Signatures
261
14.4.2
ElGamal Signatures and DSA
261
14.4.3
RSA Signatures
263
14.5
Encryption
264
14.5.1
Data Encryption Standard
265
14.5.2
Block Cipher Modes
266
14.5.3
RSA Encryption
268
14.5.4
ElGamal Encryption
269
14.6
Strength of Mechanisms
270
14.7
Performance
271
14.8
Further Reading
272
14.9
Exercises
273
275
276
276
277
278
279
279
280
281
282
283
285
286
286
287
287
288
288
289
289
291
292
292
293
295
295
CHAPTERS-
Communications
Security
297
16.1
Introduction
298
16.1.1
Threat Model
298
16.1.2
Secure Tunnels
299
16.2
Protocol Design Principles
299
16.3
IP Security
301
16.3.1
Authentication Header
302
16.3.2
Encapsulating Security Payloads
302
16.3.3
Security Associations
304
16.3.4
Internet Key Exchange Protocol
304
16.3.5
Denial of Service
306
16.3.6
IPsec
Policies
307
16.3.7
Summary
308
16.4
IPsec
and Network Address Translation
308
16.5
SSL/TLS
310
16.5.1
Implementation Issues
312
16.5.2
Summary
313
CHA
PT
E R
15 -
Key Establishment
15.1
Introduction
15.2
Key Establishment and Authentication
15.2.1
Remote Authentication
15.2.2
Key Establishment
15.3
Key Establishment Protocols
15.3.1
Authenticated Key Exchange Protocol
15.3.2
The Diffie-Hellman Protocol
15.3.3
Needham-Schroeder Protocol
15.3.4
Password-Based Protocols
15.4
Kerberos
15.4.1
Realms
15.4.2
Kerberos
and Windows
15.4.3
Delegation
15.4.4
Revocation
15.4.5
Summary
15.5
Public-Key Infrastructures
15.5.1
Certificates
15.5.2
Certificate Authorities
15.5.3
X.509/PKIX Certificates
15.5.4
Certificate Chains
15.5.5
Revocation
15.5.6
Electronic Signatures
15.6
Trusted
Computing
-
Attestation
15.7
Further
Reading
15.8
Exercises
16.6
Extensible
Authentication
Protocol
314
16.7
Further Reading
316
16.8
Exercises
316
319
320
320
321
322
322
324
324
324
325
326
327
328
329
330
330
330
331
331
331
332
333
333
334
334
334
335
335
336
CHAPTER
18
-Web Security
339
18.1
Introduction
340
18.1.1
Transport Protocol and Data Formats
340
18.1.2
WebBrowser
341
18.1.3
Threat Model
342
18.2
Authenticated Sessions
342
18.2.1
Cookie Poisoning
343
18.2.2
Cookies and Privacy
343
18.2.3
Making Ends Meet
344
18.3
Code Origin Policies
346
CHA
PTER
17
-
Network Security
17.1
Introduction
17.1.1
Threat Model
17.1.2
TCP Session Hijacking
17.1.3
TCP
SYN
Flooding Attacks
17.2
Domain
'.
Name System
17.2.1
Lightweight Authentication
17.2.2
Cache Poisoning Attack
17.2.3
Additional Resource Records
17.2.4
Dan Kaminsky's Attack
17.2.5
DNSSec
17.2.6
DNS Rebinding Attack
17.3
Firewalls
17.3.1
Packet Filters
17.3.2
Stateful Packet Filters
17.3.3
Circuit-Level Proxies
17.3.4
Application-Level Proxies
17.3.5
Firewall Policies
17.3.6
Perimeter Networks
17.3.7
Limitations and Problems
17.4
Intrusion
Detection
17.4.1
Vulnerability Assessment
17.4.2
Misuse Detection
17.4.3
Anomaly Detection
17.4.4
Network-Based IDS
17.4.5
Host-Based IDS
17.4.6
Honeypots
17.5
Further Reading
17.6
Exercises
18.3.1
HTTP Référer
347
18.4
Cross-Site Scripting
347
18.4.1
Cookie Stealing
349
18.4.2
Defending against XSS
349
18.5
Cross-Site Request Forgery
350
18.5.1
Authentication for Credit
351
18.6
JavaScript Hijacking
352
18.6.1
Outlook
354
18.7
Web Services Security
354
18.7.1
XML Digital Signatures
355
18.7.2
Federated Identity Management
357
18.7.3
XACML
359
360
361
363
364
364
365
365
366
366
367
368
368
369
369
370
370
372
373
373
375
377
378
379
381
381
383
383
CHAPTER
20-
New Access Control Paradigms
385
20.1
Introduction
386
20.1.1
Paradigm Shifts in Access Control
386
18.8
Further
Reading
18.9
Exercises
CHAPTER
19
-Mobility
19.1
Introduction
19.2
GSM
19.2.1
Components
19.2.2
Temporary Mobile Subscriber Identity
19.2.3
Cryptographic Algorithms
19.2.4
Subscriber Identity Authentication
19.2.5
Encryption
19.2.6
Location-Based Services
19.2.7
Summary
19.3
UMTS
19.3.1
False Base Station Attacks
19.3.2
Cryptographic Algorithms
19.3.3
UMTS Authentication and Key Agreen
19.4
Mobile
IPv6
Security
19.4.1
Mobile
IPv6
19.4.2
Secure Binding Updates
19.4.3
Ownership of Addresses
19.5
WLAN
19.5.1
WEP
19.5.2
WPA
19.5.3
IEEE
802.1
li
-WPA2
19.6
Bluetooth
19.7
Further
Reading
19.8
Exercises
20.1.2
Revised Terminology tor
Аса
20.2
SPKI
20.3
Trust Management
20.4
Code-Based Access Control
20.4.1
Stack Inspection
20.4.2
History-Based Access Control
20.5
Java Security
20.5.1
The Execution Model
20.5.2
The Java
1
Security Model
20.5.3
The Java
2
Security Model
20.5.4
Byte Code Verifier
20.5.5
Class Loaders
20.5.6
Policies
20.5.7
Security Manager
20.5.8
Summary
20.6
.NET Security Framework
20.6.1
Common Language Runtime
20.6.2
Code-Identity-Based Security
20.6.3
Evidence
20.6.4
Strong Names
20.6.5
Permissions
20.6.6
Security Policies
20.6.7
Stack Walk
20.6.8
Summary
20.7
Digital Rights Management
20.8
Further
Reading
20.9
Exercises
Bibliography
Index
387
388
390
391
393
394
395
396
396
397
397
398
399
399
400
400
400
401
401
402
403
403
404
405
405
406
406
409
423 |
any_adam_object | 1 |
author | Gollmann, Dieter |
author_GND | (DE-588)1132276268 |
author_facet | Gollmann, Dieter |
author_role | aut |
author_sort | Gollmann, Dieter |
author_variant | d g dg |
building | Verbundindex |
bvnumber | BV036932532 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 QA76.9.A25 G65 2011 |
callnumber-search | QA76.9.A25 QA76.9.A25 G65 2011 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)706932405 (DE-599)BVBBV036932532 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Third edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV036932532</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171113</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110112s2011 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2010036859</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB075337</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1002416027</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470741153</subfield><subfield code="c">Broschur : EUR ca. 57.90 (DE)</subfield><subfield code="9">978-0-470-74115-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470741155</subfield><subfield code="9">0-470-74115-5</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 14574115000</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706932405</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036932532</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-N2</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25 G65 2011</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gollmann, Dieter</subfield><subfield code="0">(DE-588)1132276268</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="c">Dieter Gollmann, Hamburg University of Technology</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 436 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3474600&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020847595&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020847595</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV036932532 |
illustrated | Illustrated |
indexdate | 2024-07-20T10:55:05Z |
institution | BVB |
isbn | 9780470741153 0470741155 |
language | English |
lccn | 2010036859 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020847595 |
oclc_num | 706932405 |
open_access_boolean | |
owner | DE-20 DE-11 DE-739 DE-355 DE-BY-UBR DE-Aug4 DE-706 DE-19 DE-BY-UBM DE-634 DE-860 DE-N2 |
owner_facet | DE-20 DE-11 DE-739 DE-355 DE-BY-UBR DE-Aug4 DE-706 DE-19 DE-BY-UBM DE-634 DE-860 DE-N2 |
physical | XIX, 436 Seiten Illustrationen |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
spelling | Gollmann, Dieter (DE-588)1132276268 aut Computer security Dieter Gollmann, Hamburg University of Technology Third edition Chichester Wiley [2011] © 2011 XIX, 436 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Computer security Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Datenschutz (DE-588)4011134-9 s 1\p DE-604 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3474600&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020847595&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gollmann, Dieter Computer security Computer security Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4123623-3 |
title | Computer security |
title_auth | Computer security |
title_exact_search | Computer security |
title_full | Computer security Dieter Gollmann, Hamburg University of Technology |
title_fullStr | Computer security Dieter Gollmann, Hamburg University of Technology |
title_full_unstemmed | Computer security Dieter Gollmann, Hamburg University of Technology |
title_short | Computer security |
title_sort | computer security |
topic | Computer security Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Datenschutz Computersicherheit Lehrbuch |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3474600&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020847595&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT gollmanndieter computersecurity |