Cyber defense and situational awareness:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schriftenreihe: | Advances in information security
62 |
Schlagworte: | |
Beschreibung: | XVII, 329 S. Ill., graph. Darst. |
ISBN: | 9783319113906 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV042365827 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 150217s2014 ad|| |||| 00||| eng d | ||
020 | |a 9783319113906 |c Print |9 978-3-319-11390-6 | ||
035 | |a (OCoLC)907698599 | ||
035 | |a (DE-599)BVBBV042365827 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Cyber defense and situational awareness |c Alexander Kott ..., eds. |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a XVII, 329 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 62 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Codierung |0 (DE-588)4070059-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Codierung |0 (DE-588)4070059-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kott, Alexander |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-11391-3 |
830 | 0 | |a Advances in information security |v 62 |w (DE-604)BV014168308 |9 62 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027802175 |
Datensatz im Suchindex
_version_ | 1804152999698759680 |
---|---|
any_adam_object | |
author2 | Kott, Alexander |
author2_role | edt |
author2_variant | a k ak |
author_facet | Kott, Alexander |
building | Verbundindex |
bvnumber | BV042365827 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)907698599 (DE-599)BVBBV042365827 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01493nam a2200457 cb4500</leader><controlfield tag="001">BV042365827</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150217s2014 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319113906</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-11390-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)907698599</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042365827</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber defense and situational awareness</subfield><subfield code="c">Alexander Kott ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 329 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">62</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kott, Alexander</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-11391-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">62</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">62</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027802175</subfield></datafield></record></collection> |
id | DE-604.BV042365827 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:19:38Z |
institution | BVB |
isbn | 9783319113906 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027802175 |
oclc_num | 907698599 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XVII, 329 S. Ill., graph. Darst. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Cyber defense and situational awareness Alexander Kott ..., eds. Cham [u.a.] Springer 2014 XVII, 329 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Advances in information security 62 Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung (DE-588)4070059-8 gnd rswk-swf Codierung (DE-588)4070059-8 s DE-604 Kott, Alexander edt Erscheint auch als Online-Ausgabe 978-3-319-11391-3 Advances in information security 62 (DE-604)BV014168308 62 |
spellingShingle | Cyber defense and situational awareness Advances in information security Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung (DE-588)4070059-8 gnd |
subject_GND | (DE-588)4070059-8 |
title | Cyber defense and situational awareness |
title_auth | Cyber defense and situational awareness |
title_exact_search | Cyber defense and situational awareness |
title_full | Cyber defense and situational awareness Alexander Kott ..., eds. |
title_fullStr | Cyber defense and situational awareness Alexander Kott ..., eds. |
title_full_unstemmed | Cyber defense and situational awareness Alexander Kott ..., eds. |
title_short | Cyber defense and situational awareness |
title_sort | cyber defense and situational awareness |
topic | Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung (DE-588)4070059-8 gnd |
topic_facet | Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT kottalexander cyberdefenseandsituationalawareness |