Introduction to network security: theory and practice
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2015
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | FRO01 FWS01 FWS02 UBG01 UPA01 Volltext |
Beschreibung: | 1 online resource |
ISBN: | 9781119113102 1119113105 9781118939499 1118939492 9781118939505 1118939506 |
DOI: | 10.1002/9781119113102 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043738000 | ||
003 | DE-604 | ||
005 | 20210413 | ||
007 | cr|uuu---uuuuu | ||
008 | 160826s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781119113102 |c Online |9 978-1-119-11310-2 | ||
020 | |a 1119113105 |9 1-119-11310-5 | ||
020 | |a 9781118939499 |c pdf |9 978-1-118-93949-9 | ||
020 | |a 1118939492 |c pdf |9 1-118-93949-2 | ||
020 | |a 9781118939505 |c epub |9 978-1-118-93950-5 | ||
020 | |a 1118939506 |c epub |9 1-118-93950-6 | ||
024 | 7 | |a 10.1002/9781119113102 |2 doi | |
035 | |a (ZDB-35-WIC)ocn911135225 | ||
035 | |a (OCoLC)911135225 | ||
035 | |a (DE-599)BVBBV043738000 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-863 |a DE-862 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Wang, Jie |d 1961- |e Verfasser |0 (DE-588)137285396 |4 aut | |
245 | 1 | 0 | |a Introduction to network security |b theory and practice |c Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. |
250 | |a Second edition | ||
264 | 1 | |a Hoboken, NJ |b Wiley |c 2015 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kissel, Zachary A. |e Verfasser |0 (DE-588)1076992846 |4 aut | |
856 | 4 | 0 | |u https://doi.org/10.1002/9781119113102 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029149777 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102 |l FWS01 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102 |l FWS02 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781119113102 |l UPA01 |p ZDB-35-WIC |q UPA_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 658025 |
---|---|
_version_ | 1824554619211087873 |
any_adam_object | |
author | Wang, Jie 1961- Kissel, Zachary A. |
author_GND | (DE-588)137285396 (DE-588)1076992846 |
author_facet | Wang, Jie 1961- Kissel, Zachary A. |
author_role | aut aut |
author_sort | Wang, Jie 1961- |
author_variant | j w jw z a k za zak |
building | Verbundindex |
bvnumber | BV043738000 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn911135225 (OCoLC)911135225 (DE-599)BVBBV043738000 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1002/9781119113102 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02724nmm a2200601zc 4500</leader><controlfield tag="001">BV043738000</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210413 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160826s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119113102</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-11310-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119113105</subfield><subfield code="9">1-119-11310-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118939499</subfield><subfield code="c">pdf</subfield><subfield code="9">978-1-118-93949-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118939492</subfield><subfield code="c">pdf</subfield><subfield code="9">1-118-93949-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118939505</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-118-93950-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118939506</subfield><subfield code="c">epub</subfield><subfield code="9">1-118-93950-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119113102</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn911135225</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)911135225</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043738000</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wang, Jie</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)137285396</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to network security</subfield><subfield code="b">theory and practice</subfield><subfield code="c">Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kissel, Zachary A.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1076992846</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781119113102</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029149777</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119113102</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119113102</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UPA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043738000 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T06:54:39Z |
institution | BVB |
isbn | 9781119113102 1119113105 9781118939499 1118939492 9781118939505 1118939506 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029149777 |
oclc_num | 911135225 |
open_access_boolean | |
owner | DE-861 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-739 |
owner_facet | DE-861 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-739 |
physical | 1 online resource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UPA_PDA_WIC_Kauf |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spellingShingle | Wang, Jie 1961- Kissel, Zachary A. Introduction to network security theory and practice COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks / Security measures Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4070085-9 |
title | Introduction to network security theory and practice |
title_auth | Introduction to network security theory and practice |
title_exact_search | Introduction to network security theory and practice |
title_full | Introduction to network security theory and practice Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. |
title_fullStr | Introduction to network security theory and practice Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. |
title_full_unstemmed | Introduction to network security theory and practice Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA. |
title_short | Introduction to network security |
title_sort | introduction to network security theory and practice |
title_sub | theory and practice |
topic | COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks / Security measures Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Sicherheit Rechnernetz |
url | https://doi.org/10.1002/9781119113102 |
work_keys_str_mv | AT wangjie introductiontonetworksecuritytheoryandpractice AT kisselzacharya introductiontonetworksecuritytheoryandpractice |