Cybersecurity in Switzerland:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham ; s.l.
Springer International Publishing
2014
Imprint: Springer |
Schriftenreihe: | SpringerBriefs in Cybersecurity
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 75 p.) Ill. |
ISBN: | 9783319106205 |
DOI: | 10.1007/978-3-319-10620-5 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042186662 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 141114s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319106205 |c Online |9 978-3-319-10620-5 | ||
024 | 7 | |a 10.1007/978-3-319-10620-5 |2 doi | |
035 | |a (OCoLC)894703521 | ||
035 | |a (DE-599)BVBBV042186662 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-29 |a DE-861 |a DE-Aug4 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 320 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Dunn Cavelty, Myriam |d 1976- |e Verfasser |0 (DE-588)140208453 |4 aut | |
245 | 1 | 0 | |a Cybersecurity in Switzerland |c by Myriam Dunn Cavelty |
264 | 1 | |a Cham ; s.l. |b Springer International Publishing |c 2014 | |
264 | 1 | |b Imprint: Springer | |
300 | |a 1 Online-Ressource (X, 75 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Cybersecurity | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Reproduktion von |a Dunn Cavelty, Myriam, 1976- |t Cybersecurity in Switzerland |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-10619-9 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-10620-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027625785 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10620-5 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152698740670464 |
---|---|
adam_text | CYBERSECURITY IN SWITZERLAND
/ DUNN CAVELTY, MYRIAM
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FOREWORD
LIST OF ABBREVIATIONS
INTRODUCTION
GLOBAL CYBER-SECURITY POLICY EVOLUTION
PHASE 1: THE FOUR PILLAR MODEL FOR INFORMATION ASSURANCE (1997-2004)
PHASE 2: REPORTING AND ANALYSIS CENTER FOR INFORMATION ASSURANCE
(MELANI) (2004-2010)
PHASE 3: CONSOLIDATION AND CYBER-RISK STRATEGY (2011-2014)
CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBERSECURITY IN SWITZERLAND
/ DUNN CAVELTY, MYRIAM
: 2014
ABSTRACT / INHALTSTEXT
GIVES THE READER A DETAILED ACCOUNT OF HOW CYBER-SECURITY IN SWITZERLAND
HAS EVOLVED OVER THE YEARS, USING OFFICIAL DOCUMENTS AND A CONSIDERABLE
AMOUNT OF INSIDE KNOWLEDGE. IT FOCUSES ON KEY IDEAS, INSTITUTIONAL
ARRANGEMENTS, ON THE PUBLICATION OF STRATEGY PAPERS, AND IMPORTANTLY, ON
PROCESSES LEADING UP TO THESE STRATEGY DOCUMENTS. THE PECULIARITIES OF
THE SWISS POLITICAL SYSTEM, WHICH INFLUENCE THE WAY CYBER-SECURITY CAN
BE DESIGNED AND PRACTICED IN SWITZERLAND ARE CONSIDERED, AS WELL AS THE
BIGGER, GLOBAL INFLUENCES AND DRIVING FACTORS THAT SHAPED THE SWISS
APPROACH TO CYBER-SECURITY. IT SHOWS THAT THROUGHOUT THE YEARS, THE MOST
IMPORTANT INFLUENCE ON THE SWISS POLICY-APPROACH WAS THE INTERNATIONAL
LEVEL, OR RATHER THE DEVELOPMENTS OF A CYBER-SECURITY POLICY IN OTHER
STATES. EVEN THOUGH MANY OF THE BASIC IDEAS ABOUT INFORMATION-SHARING
AND PUBLIC-PRIVATE PARTNERSHIPS WERE INFLUENCED BY (AMONGST OTHERS) THE
US APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION, THE PECULIARITIES OF
THE SWISS POLITICAL SYSTEM HAS LED TO A PARTICULAR “SWISS SOLUTION”,
WHICH IS BASED ON THE FEDERALIST STRUCTURES AND SUBSIDIARY PRINCIPLES,
CHARACTERIZED BY STABILITY AND RESILIENCE TO EXTERNAL SHOCKS IN THE FORM
OF CYBER-INCIDENTS. CYBERSECURITY IN SWITZERLAND WILL BE A STIMULATING
READ FOR ANYBODY INTERESTED IN CYBER-SECURITY POLICY, INCLUDING
STUDENTS, RESEARCHERS, ANALYSTS AND POLICY MAKERS. IT CONTAINS NOT ONLY
SPECIFIC MATERIAL ON AN INTERESTING CASE, BUT ALSO A WEALTH OF
BACKGROUND INFORMATION ON DIFFERENT VARIATIONS OF CYBER-SECURITY, AS
WELL AS ON INFORMATION-SHARING AND PUBLIC-PRIVATE PARTNERSHIPS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Dunn Cavelty, Myriam 1976- |
author_GND | (DE-588)140208453 |
author_facet | Dunn Cavelty, Myriam 1976- |
author_role | aut |
author_sort | Dunn Cavelty, Myriam 1976- |
author_variant | c m d cm cmd |
building | Verbundindex |
bvnumber | BV042186662 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)894703521 (DE-599)BVBBV042186662 |
dewey-full | 320 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 320 - Political science (Politics and government) |
dewey-raw | 320 |
dewey-search | 320 |
dewey-sort | 3320 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Informatik Politologie |
doi_str_mv | 10.1007/978-3-319-10620-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03422nmm a2200613 c 4500</leader><controlfield tag="001">BV042186662</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141114s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319106205</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-10620-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-10620-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)894703521</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042186662</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">320</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dunn Cavelty, Myriam</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)140208453</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity in Switzerland</subfield><subfield code="c">by Myriam Dunn Cavelty</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; s.l.</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 75 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Cybersecurity</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Dunn Cavelty, Myriam, 1976-</subfield><subfield code="t">Cybersecurity in Switzerland</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-10619-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027625785</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10620-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042186662 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:14:51Z |
institution | BVB |
isbn | 9783319106205 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027625785 |
oclc_num | 894703521 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (X, 75 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer International Publishing Imprint: Springer |
record_format | marc |
series2 | SpringerBriefs in Cybersecurity |
spelling | Dunn Cavelty, Myriam 1976- Verfasser (DE-588)140208453 aut Cybersecurity in Switzerland by Myriam Dunn Cavelty Cham ; s.l. Springer International Publishing 2014 Imprint: Springer 1 Online-Ressource (X, 75 p.) Ill. txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Cybersecurity Online-Ausgabe Springer eBook Collection / Computer Science Datenschutz (DE-588)4011134-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Datenschutz (DE-588)4011134-9 s Internetkriminalität (DE-588)7864395-8 s DE-604 Reproduktion von Dunn Cavelty, Myriam, 1976- Cybersecurity in Switzerland 2014 Erscheint auch als Druckausgabe 978-3-319-10619-9 https://doi.org/10.1007/978-3-319-10620-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Dunn Cavelty, Myriam 1976- Cybersecurity in Switzerland Datenschutz (DE-588)4011134-9 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)7864395-8 |
title | Cybersecurity in Switzerland |
title_auth | Cybersecurity in Switzerland |
title_exact_search | Cybersecurity in Switzerland |
title_full | Cybersecurity in Switzerland by Myriam Dunn Cavelty |
title_fullStr | Cybersecurity in Switzerland by Myriam Dunn Cavelty |
title_full_unstemmed | Cybersecurity in Switzerland by Myriam Dunn Cavelty |
title_short | Cybersecurity in Switzerland |
title_sort | cybersecurity in switzerland |
topic | Datenschutz (DE-588)4011134-9 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Datenschutz Internetkriminalität |
url | https://doi.org/10.1007/978-3-319-10620-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027625785&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dunncaveltymyriam cybersecurityinswitzerland |