Cyber Security:
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and in...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (126 pages) |
ISBN: | 9781118651735 9781118651643 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043607169 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118651735 |9 978-1-118-65173-5 | ||
020 | |a 9781118651643 |c Print |9 978-1-118-65164-3 | ||
035 | |a (ZDB-30-PQE)EBC1598809 | ||
035 | |a (ZDB-89-EBL)EBL1598809 | ||
035 | |a (ZDB-38-EBR)ebr10829812 | ||
035 | |a (OCoLC)868965198 | ||
035 | |a (DE-599)BVBBV043607169 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Voeller, John G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber Security |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (126 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed | ||
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Cyberspace -- Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Voeller, John G |t . Cyber Security |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029021228 |
Datensatz im Suchindex
_version_ | 1804176354068922368 |
---|---|
any_adam_object | |
author | Voeller, John G. |
author_facet | Voeller, John G. |
author_role | aut |
author_sort | Voeller, John G. |
author_variant | j g v jg jgv |
building | Verbundindex |
bvnumber | BV043607169 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1598809 (ZDB-89-EBL)EBL1598809 (ZDB-38-EBR)ebr10829812 (OCoLC)868965198 (DE-599)BVBBV043607169 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01580nmm a2200397zc 4500</leader><controlfield tag="001">BV043607169</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118651735</subfield><subfield code="9">978-1-118-65173-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118651643</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-118-65164-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1598809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1598809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10829812</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)868965198</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043607169</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Voeller, John G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (126 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace -- Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Voeller, John G</subfield><subfield code="t">. Cyber Security</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029021228</subfield></datafield></record></collection> |
id | DE-604.BV043607169 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781118651735 9781118651643 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029021228 |
oclc_num | 868965198 |
open_access_boolean | |
physical | 1 online resource (126 pages) |
psigel | ZDB-30-PQE ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Voeller, John G. Verfasser aut Cyber Security 1st ed Somerset Wiley 2014 © 2014 1 online resource (126 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed Computer networks -- Security measures Cyberspace -- Security measures Erscheint auch als Druck-Ausgabe Voeller, John G . Cyber Security |
spellingShingle | Voeller, John G. Cyber Security Computer networks -- Security measures Cyberspace -- Security measures |
title | Cyber Security |
title_auth | Cyber Security |
title_exact_search | Cyber Security |
title_full | Cyber Security |
title_fullStr | Cyber Security |
title_full_unstemmed | Cyber Security |
title_short | Cyber Security |
title_sort | cyber security |
topic | Computer networks -- Security measures Cyberspace -- Security measures |
topic_facet | Computer networks -- Security measures Cyberspace -- Security measures |
work_keys_str_mv | AT voellerjohng cybersecurity |