Advanced in computers, Volume 94:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Academic Press
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Beschreibung: | Includes bibliographical references and indexes |
Beschreibung: | 1 Online-Ressource (1 v.) |
ISBN: | 9780128003251 0128003251 9780128001615 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042489966 | ||
003 | DE-604 | ||
005 | 20220930 | ||
007 | cr|uuu---uuuuu | ||
008 | 150409s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128003251 |c Online |9 978-0-12-800325-1 | ||
020 | |a 0128003251 |c Online |9 0-12-800325-1 | ||
020 | |a 9780128001615 |c Print |9 978-0-12-800161-5 | ||
035 | |a (OCoLC)893919728 | ||
035 | |a (DE-599)BVBBV042489966 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-706 | ||
082 | 0 | |a 004 |2 23 | |
245 | 1 | 0 | |a Advanced in computers, Volume 94 |c Ali Hurson, [editor] |
250 | |a 1st ed | ||
264 | 1 | |a Waltham, MA |b Academic Press |c 2014 | |
300 | |a 1 Online-Ressource (1 v.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and indexes | ||
505 | 0 | |a Comparison of security models : attack graphs versus Petri nets -- A survey on zero-knowledge proofs -- Similarity of private keyword search over encrypted document collection -- Multiobjective optimization for software refactoring and evolution | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Informatik | |
650 | 4 | |a Electronic data processing | |
650 | 4 | |a Computer science | |
653 | |a Electronic books | ||
700 | 1 | |a Hurson, A. R. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://proquest.tech.safaribooksonline.de/9780128001615 |x Verlag |3 Volltext |
912 | |a ZDB-32-STB |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027924766 | ||
966 | e | |u https://www.sciencedirect.com/bookseries/advances-in-computers/vol/94 |l UBY01 |p ZDB-33-ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153224760918016 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042489966 |
collection | ZDB-32-STB ZDB-33-ESD ZDB-33-EBS |
contents | Comparison of security models : attack graphs versus Petri nets -- A survey on zero-knowledge proofs -- Similarity of private keyword search over encrypted document collection -- Multiobjective optimization for software refactoring and evolution |
ctrlnum | (OCoLC)893919728 (DE-599)BVBBV042489966 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01658nmm a2200421zc 4500</leader><controlfield tag="001">BV042489966</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220930 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150409s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128003251</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-800325-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128003251</subfield><subfield code="c">Online</subfield><subfield code="9">0-12-800325-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128001615</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-800161-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)893919728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042489966</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced in computers, Volume 94</subfield><subfield code="c">Ali Hurson, [editor]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Academic Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 v.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Comparison of security models : attack graphs versus Petri nets -- A survey on zero-knowledge proofs -- Similarity of private keyword search over encrypted document collection -- Multiobjective optimization for software refactoring and evolution</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hurson, A. R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://proquest.tech.safaribooksonline.de/9780128001615</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027924766</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.sciencedirect.com/bookseries/advances-in-computers/vol/94</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042489966 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:23:13Z |
institution | BVB |
isbn | 9780128003251 0128003251 9780128001615 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027924766 |
oclc_num | 893919728 |
open_access_boolean | |
owner | DE-1046 DE-706 |
owner_facet | DE-1046 DE-706 |
physical | 1 Online-Ressource (1 v.) |
psigel | ZDB-32-STB ZDB-33-ESD ZDB-33-EBS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Academic Press |
record_format | marc |
spelling | Advanced in computers, Volume 94 Ali Hurson, [editor] 1st ed Waltham, MA Academic Press 2014 1 Online-Ressource (1 v.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and indexes Comparison of security models : attack graphs versus Petri nets -- A survey on zero-knowledge proofs -- Similarity of private keyword search over encrypted document collection -- Multiobjective optimization for software refactoring and evolution Datenverarbeitung Informatik Electronic data processing Computer science Electronic books Hurson, A. R. Sonstige oth http://proquest.tech.safaribooksonline.de/9780128001615 Verlag Volltext |
spellingShingle | Advanced in computers, Volume 94 Comparison of security models : attack graphs versus Petri nets -- A survey on zero-knowledge proofs -- Similarity of private keyword search over encrypted document collection -- Multiobjective optimization for software refactoring and evolution Datenverarbeitung Informatik Electronic data processing Computer science |
title | Advanced in computers, Volume 94 |
title_auth | Advanced in computers, Volume 94 |
title_exact_search | Advanced in computers, Volume 94 |
title_full | Advanced in computers, Volume 94 Ali Hurson, [editor] |
title_fullStr | Advanced in computers, Volume 94 Ali Hurson, [editor] |
title_full_unstemmed | Advanced in computers, Volume 94 Ali Hurson, [editor] |
title_short | Advanced in computers, Volume 94 |
title_sort | advanced in computers volume 94 |
topic | Datenverarbeitung Informatik Electronic data processing Computer science |
topic_facet | Datenverarbeitung Informatik Electronic data processing Computer science |
url | http://proquest.tech.safaribooksonline.de/9780128001615 |
work_keys_str_mv | AT hursonar advancedincomputersvolume94 |