Cyber Warfare: Building the Scientific Foundation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Advances in Information Security
56 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 321 p.) Ill. |
ISBN: | 9783319140391 |
ISSN: | 1568-2633 |
DOI: | 10.1007/978-3-319-14039-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042544358 | ||
003 | DE-604 | ||
005 | 20150519 | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319140391 |c Online |9 978-3-319-14039-1 | ||
024 | 7 | |a 10.1007/978-3-319-14039-1 |2 doi | |
035 | |a (OCoLC)908701394 | ||
035 | |a (DE-599)BVBBV042544358 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Jajodia, Sushil |d 1947- |e Verfasser |0 (DE-588)120551683 |4 aut | |
245 | 1 | 0 | |a Cyber Warfare |b Building the Scientific Foundation |c edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 321 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v 56 |x 1568-2633 | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shakarian, Paulo |e Sonstige |4 oth | |
700 | 1 | |a Subrahmanian, V.S. |e Sonstige |4 oth | |
700 | 1 | |a Swarup, Vipin |e Sonstige |0 (DE-588)1047455862 |4 oth | |
700 | 1 | |a Wang, Cliff |e Sonstige |0 (DE-588)1047455986 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-14038-4 |
830 | 0 | |a Advances in Information Security |v 56 |w (DE-604)BV022281064 |9 56 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-14039-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978364 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-14039-1 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153309806723072 |
---|---|
adam_text | CYBER WARFARE
/ JAJODIA, SUSHIL
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CYBER WAR GAMES
ALTERNATIVES TO CYBER WARFARE: DETERRENCE AND ASSURANCE
IDENTIFYING AND EXPLOITING THE CYBER HIGH GROUND WITH BOTNETS
ATTRIBUTION, TEMPTATION, AND EXPECTATION: A FORMAL FRAMEWORK FOR
DEFENSE-BY-DECEPTION IN CYBERFARE
GAME-THEORETIC FOUNDATIONS FOR THE STRATEGIC USE OF HONEYPOTS IN NETWORK
SECURITY
CYBER COUNTERDECEPTION: HOW TO DETECT DENIAL & DECEPTION
AUTOMATED ADVERSARY PROFILING
CYBER ATTRIBUTION: AN ARGUMENTATION-BASED APPROACH
THE HUMAN FACTOR IN CYBERSECURITY: ROBUST & INTELLIGENT DEFENSE
CYBERWAR GAME: A PARADIGM FOR UNDERSTANDING NEW CHALLENGES OF CYBER WAR
ACTIVE DISCOVERY OF HIDDEN PROFILES IN SOCIAL NETWORKS USING MALWARE
A SURVERY OF COMMUNITY DETECTION ALGORITHMS BASED ON ANALYSIS-INTENT
UNDERSTANDING THE VULNERABILITY LIFECYCLE FOR RISK ASSESSMENT AND
DEFENSE AGAINST SOPHISTICATED CYBER ATTACKS
GRAPH MINING FOR CYBER SECURITY
PROGRAMMING LANGUAGE THEORETIC SECURITY IN THE REAL WORLD: A MIRAGE OR
THE FUTURE?
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBER WARFARE
/ JAJODIA, SUSHIL
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK FEATURES A WIDE SPECTRUM OF THE LATEST COMPUTER SCIENCE
RESEARCH RELATING TO CYBER WARFARE, INCLUDING MILITARY AND POLICY
DIMENSIONS. IT IS THE FIRST BOOK TO EXPLORE THE SCIENTIFIC FOUNDATION OF
CYBER WARFARE AND FEATURES RESEARCH FROM THE AREAS OF ARTIFICIAL
INTELLIGENCE, GAME THEORY, PROGRAMMING LANGUAGES, GRAPH THEORY AND MORE.
THE HIGH-LEVEL APPROACH AND EMPHASIS ON SCIENTIFIC RIGOR PROVIDES
INSIGHTS ON WAYS TO IMPROVE CYBER WARFARE DEFENSE WORLDWIDE. CYBER
WARFARE: BUILDING THE SCIENTIFIC FOUNDATION TARGETS RESEARCHERS AND
PRACTITIONERS WORKING IN CYBER SECURITY, ESPECIALLY GOVERNMENT EMPLOYEES
OR CONTRACTORS. ADVANCED-LEVEL STUDENTS IN COMPUTER SCIENCE AND
ELECTRICAL ENGINEERING WITH AN INTEREST IN SECURITY WILL ALSO FIND THIS
CONTENT VALUABLE AS A SECONDARY TEXTBOOK OR REFERENCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Jajodia, Sushil 1947- |
author_GND | (DE-588)120551683 (DE-588)1047455862 (DE-588)1047455986 |
author_facet | Jajodia, Sushil 1947- |
author_role | aut |
author_sort | Jajodia, Sushil 1947- |
author_variant | s j sj |
building | Verbundindex |
bvnumber | BV042544358 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)908701394 (DE-599)BVBBV042544358 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-14039-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04080nmm a2200721zcb4500</leader><controlfield tag="001">BV042544358</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150519 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319140391</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-14039-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-14039-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544358</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Warfare</subfield><subfield code="b">Building the Scientific Foundation</subfield><subfield code="c">edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 321 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">56</subfield><subfield code="x">1568-2633</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Subrahmanian, V.S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Swarup, Vipin</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1047455862</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cliff</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1047455986</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-14038-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">56</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">56</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978364</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-14039-1</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042544358 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
isbn | 9783319140391 |
issn | 1568-2633 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978364 |
oclc_num | 908701394 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XIII, 321 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spelling | Jajodia, Sushil 1947- Verfasser (DE-588)120551683 aut Cyber Warfare Building the Scientific Foundation edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang Cham Springer International Publishing 2015 1 Online-Ressource (XIII, 321 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 56 1568-2633 Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Informatik (DE-588)4026894-9 s Datensicherung (DE-588)4011144-1 s Chiffrierung (DE-588)4352893-4 s Internetkriminalität (DE-588)7864395-8 s DE-604 Shakarian, Paulo Sonstige oth Subrahmanian, V.S. Sonstige oth Swarup, Vipin Sonstige (DE-588)1047455862 oth Wang, Cliff Sonstige (DE-588)1047455986 oth Erscheint auch als Druckausgabe 978-3-319-14038-4 Advances in Information Security 56 (DE-604)BV022281064 56 https://doi.org/10.1007/978-3-319-14039-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Jajodia, Sushil 1947- Cyber Warfare Building the Scientific Foundation Advances in Information Security Internetkriminalität (DE-588)7864395-8 gnd Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4352893-4 (DE-588)4026894-9 (DE-588)4011144-1 |
title | Cyber Warfare Building the Scientific Foundation |
title_auth | Cyber Warfare Building the Scientific Foundation |
title_exact_search | Cyber Warfare Building the Scientific Foundation |
title_full | Cyber Warfare Building the Scientific Foundation edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
title_fullStr | Cyber Warfare Building the Scientific Foundation edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
title_full_unstemmed | Cyber Warfare Building the Scientific Foundation edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang |
title_short | Cyber Warfare |
title_sort | cyber warfare building the scientific foundation |
title_sub | Building the Scientific Foundation |
topic | Internetkriminalität (DE-588)7864395-8 gnd Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Internetkriminalität Chiffrierung Informatik Datensicherung |
url | https://doi.org/10.1007/978-3-319-14039-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978364&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT jajodiasushil cyberwarfarebuildingthescientificfoundation AT shakarianpaulo cyberwarfarebuildingthescientificfoundation AT subrahmanianvs cyberwarfarebuildingthescientificfoundation AT swarupvipin cyberwarfarebuildingthescientificfoundation AT wangcliff cyberwarfarebuildingthescientificfoundation |