Network security attacks and countermeasures:
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
Information Science Reference, an imprint of IGI Global
[2016]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Online-Zugang: | EBB01 DE-1050 DE-573 DE-1049 DE-91 DE-706 DE-29 DE-20 DE-898 DE-83 |
Beschreibung: | 1 Online-Ressource (xv, 357 Seiten) |
ISBN: | 9781466687622 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV043355586 | ||
003 | DE-604 | ||
005 | 20190918 | ||
007 | cr|uuu---uuuuu | ||
008 | 160210s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781466687622 |9 978-1-4666-8762-2 | ||
024 | 7 | |a 10.4018/978-1-4666-8761-5 |2 doi | |
035 | |a (OCoLC)955399768 | ||
035 | |a (DE-599)BVBBV043355586 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1049 |a DE-706 |a DE-29 |a DE-91 |a DE-573 |a DE-1050 |a DE-20 |a DE-898 |a DE-83 | ||
245 | 1 | 0 | |a Network security attacks and countermeasures |c Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia) |
264 | 1 | |a Hershey PA, USA |b Information Science Reference, an imprint of IGI Global |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (xv, 357 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
700 | 1 | |a Kumar G., Dileep |d 1982- |0 (DE-588)1113121394 |4 edt | |
700 | 1 | |a Singh, Manoj Kumar |4 edt | |
700 | 1 | |a Jayanthi, M. K. |d 1976- |0 (DE-588)1168174627 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4666-8761-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-4666-8761-4 |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u http://www.igi-global.com/gateway/book/127617 |x Verlag |3 Volltext |l EBB01 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://www.igi-global.com/gateway/book/127617 |l DE-29 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805078989802307584 |
---|---|
adam_text | |
any_adam_object | |
author2 | Kumar G., Dileep 1982- Singh, Manoj Kumar Jayanthi, M. K. 1976- |
author2_role | edt edt edt |
author2_variant | g d k gd gdk m k s mk mks m k j mk mkj |
author_GND | (DE-588)1113121394 (DE-588)1168174627 |
author_facet | Kumar G., Dileep 1982- Singh, Manoj Kumar Jayanthi, M. K. 1976- |
building | Verbundindex |
bvnumber | BV043355586 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)955399768 (DE-599)BVBBV043355586 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV043355586</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190918</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160210s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466687622</subfield><subfield code="9">978-1-4666-8762-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-8761-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)955399768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043355586</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security attacks and countermeasures</subfield><subfield code="c">Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">Information Science Reference, an imprint of IGI Global</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 357 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar G., Dileep</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)1113121394</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Manoj Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jayanthi, M. K.</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1168174627</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4666-8761-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4666-8761-4</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.igi-global.com/gateway/book/127617</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield><subfield code="l">EBB01</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.igi-global.com/gateway/book/127617</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043355586 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:37:51Z |
institution | BVB |
isbn | 9781466687622 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028774958 |
oclc_num | 955399768 |
open_access_boolean | |
owner | DE-1049 DE-706 DE-29 DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1049 DE-706 DE-29 DE-91 DE-BY-TUM DE-573 DE-1050 DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xv, 357 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Information Science Reference, an imprint of IGI Global |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia) Hershey PA, USA Information Science Reference, an imprint of IGI Global [2016] © 2016 1 Online-Ressource (xv, 357 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source Kumar G., Dileep 1982- (DE-588)1113121394 edt Singh, Manoj Kumar edt Jayanthi, M. K. 1976- (DE-588)1168174627 edt Erscheint auch als Druck-Ausgabe 978-1-4666-8761-5 Erscheint auch als Druck-Ausgabe 1-4666-8761-4 |
spellingShingle | Network security attacks and countermeasures |
title | Network security attacks and countermeasures |
title_auth | Network security attacks and countermeasures |
title_exact_search | Network security attacks and countermeasures |
title_full | Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia) |
title_fullStr | Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia) |
title_full_unstemmed | Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia) |
title_short | Network security attacks and countermeasures |
title_sort | network security attacks and countermeasures |
work_keys_str_mv | AT kumargdileep networksecurityattacksandcountermeasures AT singhmanojkumar networksecurityattacksandcountermeasures AT jayanthimk networksecurityattacksandcountermeasures |