Cyber-physical attack recovery procedures: a step-by-step preparation and response guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[Berkeley, CA]
Apress
[2016]
2016 |
Schriftenreihe: | Books for professionals by professionals
|
Schlagworte: | |
Beschreibung: | xx, 159 Seiten Diagramme |
ISBN: | 9781484220641 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043713953 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 160810s2016 |||| |||| 00||| eng d | ||
020 | |a 9781484220641 |c pbk |9 978-1-4842-2064-1 | ||
035 | |a (OCoLC)957672606 | ||
035 | |a (DE-599)BVBBV043713953 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ZQ 5020 |0 (DE-625)158105: |2 rvk | ||
100 | 1 | |a Ayala, Luis |e Verfasser |0 (DE-588)1110995482 |4 aut | |
245 | 1 | 0 | |a Cyber-physical attack recovery procedures |b a step-by-step preparation and response guide |c Luis Ayala |
264 | 1 | |a [Berkeley, CA] |b Apress |c [2016] | |
264 | 1 | |c 2016 | |
264 | 4 | |c © 2016 | |
300 | |a xx, 159 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Books for professionals by professionals | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer hardware | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Hardware | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyber-physisches System |0 (DE-588)1069505412 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyber-physisches System |0 (DE-588)1069505412 |D s |
689 | 0 | 1 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4842-2065-8 |
999 | |a oai:aleph.bib-bvb.de:BVB01-029126163 |
Datensatz im Suchindex
_version_ | 1804176501167357952 |
---|---|
any_adam_object | |
author | Ayala, Luis |
author_GND | (DE-588)1110995482 |
author_facet | Ayala, Luis |
author_role | aut |
author_sort | Ayala, Luis |
author_variant | l a la |
building | Verbundindex |
bvnumber | BV043713953 |
classification_rvk | ST 277 ZQ 5020 |
ctrlnum | (OCoLC)957672606 (DE-599)BVBBV043713953 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik / Mechatronik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01761nam a2200529 c 4500</leader><controlfield tag="001">BV043713953</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160810s2016 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484220641</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-4842-2064-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)957672606</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043713953</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZQ 5020</subfield><subfield code="0">(DE-625)158105:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ayala, Luis</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1110995482</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-physical attack recovery procedures</subfield><subfield code="b">a step-by-step preparation and response guide</subfield><subfield code="c">Luis Ayala</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berkeley, CA]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 159 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Books for professionals by professionals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hardware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Hardware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-2065-8</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029126163</subfield></datafield></record></collection> |
id | DE-604.BV043713953 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:33:11Z |
institution | BVB |
isbn | 9781484220641 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029126163 |
oclc_num | 957672606 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xx, 159 Seiten Diagramme |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Apress |
record_format | marc |
series2 | Books for professionals by professionals |
spelling | Ayala, Luis Verfasser (DE-588)1110995482 aut Cyber-physical attack recovery procedures a step-by-step preparation and response guide Luis Ayala [Berkeley, CA] Apress [2016] 2016 © 2016 xx, 159 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Books for professionals by professionals Computer science Computer hardware Computer communication systems Computer security Data encryption (Computer science) Computer Science Computer Hardware Systems and Data Security Data Encryption Computer Communication Networks Informatik Cyberattacke (DE-588)1075612675 gnd rswk-swf Cyber-physisches System (DE-588)1069505412 gnd rswk-swf Cyber-physisches System (DE-588)1069505412 s Cyberattacke (DE-588)1075612675 s DE-604 Erscheint auch als Online-Ausgabe 978-1-4842-2065-8 |
spellingShingle | Ayala, Luis Cyber-physical attack recovery procedures a step-by-step preparation and response guide Computer science Computer hardware Computer communication systems Computer security Data encryption (Computer science) Computer Science Computer Hardware Systems and Data Security Data Encryption Computer Communication Networks Informatik Cyberattacke (DE-588)1075612675 gnd Cyber-physisches System (DE-588)1069505412 gnd |
subject_GND | (DE-588)1075612675 (DE-588)1069505412 |
title | Cyber-physical attack recovery procedures a step-by-step preparation and response guide |
title_auth | Cyber-physical attack recovery procedures a step-by-step preparation and response guide |
title_exact_search | Cyber-physical attack recovery procedures a step-by-step preparation and response guide |
title_full | Cyber-physical attack recovery procedures a step-by-step preparation and response guide Luis Ayala |
title_fullStr | Cyber-physical attack recovery procedures a step-by-step preparation and response guide Luis Ayala |
title_full_unstemmed | Cyber-physical attack recovery procedures a step-by-step preparation and response guide Luis Ayala |
title_short | Cyber-physical attack recovery procedures |
title_sort | cyber physical attack recovery procedures a step by step preparation and response guide |
title_sub | a step-by-step preparation and response guide |
topic | Computer science Computer hardware Computer communication systems Computer security Data encryption (Computer science) Computer Science Computer Hardware Systems and Data Security Data Encryption Computer Communication Networks Informatik Cyberattacke (DE-588)1075612675 gnd Cyber-physisches System (DE-588)1069505412 gnd |
topic_facet | Computer science Computer hardware Computer communication systems Computer security Data encryption (Computer science) Computer Science Computer Hardware Systems and Data Security Data Encryption Computer Communication Networks Informatik Cyberattacke Cyber-physisches System |
work_keys_str_mv | AT ayalaluis cyberphysicalattackrecoveryproceduresastepbysteppreparationandresponseguide |