Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress
[2017]
|
Schriftenreihe: | Syngress advanced topics in information security
|
Schlagworte: | |
Online-Zugang: | BTU01 FAW01 FLA01 UBY01 URL des Erstveröffentlichers |
Beschreibung: | Description based on online resource; title from title page (Safari, viewed November 10, 2016) |
Beschreibung: | 1 online resource (xxvi, 273 pages) illustrations |
ISBN: | 9780128038383 0128038381 9780128037737 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043970545 | ||
003 | DE-604 | ||
005 | 20200408 | ||
007 | cr|uuu---uuuuu | ||
008 | 161219s2017 |||| o||u| ||||||eng d | ||
020 | |a 9780128038383 |9 978-0-12-803838-3 | ||
020 | |a 0128038381 |9 0-12-803838-1 | ||
020 | |a 9780128037737 |c Print |9 978-0-12-803773-7 | ||
035 | |a (ZDB-32-STB)ocn962419826 | ||
035 | |a (OCoLC)960041270 | ||
035 | |a (DE-599)BVBBV043970545 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-634 |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Handbook of system safety and security |b cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems |c edited by Edward Griffor |
264 | 1 | |a Cambridge, MA |b Syngress |c [2017] | |
264 | 4 | |c 2017 | |
300 | |a 1 online resource (xxvi, 273 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Syngress advanced topics in information security | |
500 | |a Description based on online resource; title from title page (Safari, viewed November 10, 2016) | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Griffor, Edward R. |4 edt | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128037737 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-32-STB |a ZDB-33-ESD |a ZDB-33-EBS |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029379132 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128037737 |l BTU01 |p ZDB-33-EBS |q BTU_PDA_EBS_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128037737 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128037737 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1151336 |l UBY01 |p ZDB-4-NLEBK |q UBY01_DDA20 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176930562375680 |
---|---|
any_adam_object | |
author2 | Griffor, Edward R. |
author2_role | edt |
author2_variant | e r g er erg |
author_facet | Griffor, Edward R. |
building | Verbundindex |
bvnumber | BV043970545 |
collection | ZDB-32-STB ZDB-33-ESD ZDB-33-EBS ZDB-4-NLEBK |
ctrlnum | (ZDB-32-STB)ocn962419826 (OCoLC)960041270 (DE-599)BVBBV043970545 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02817nmm a2200601zc 4500</leader><controlfield tag="001">BV043970545</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200408 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161219s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128038383</subfield><subfield code="9">978-0-12-803838-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128038381</subfield><subfield code="9">0-12-803838-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128037737</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-803773-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-32-STB)ocn962419826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960041270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043970545</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of system safety and security</subfield><subfield code="b">cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems</subfield><subfield code="c">edited by Edward Griffor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 273 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress advanced topics in information security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (Safari, viewed November 10, 2016)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Griffor, Edward R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128037737</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029379132</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128037737</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-33-EBS</subfield><subfield code="q">BTU_PDA_EBS_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128037737</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128037737</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1151336</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA20</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043970545 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:40:00Z |
institution | BVB |
isbn | 9780128038383 0128038381 9780128037737 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029379132 |
oclc_num | 962419826 960041270 |
open_access_boolean | |
owner | DE-1046 DE-634 DE-706 |
owner_facet | DE-1046 DE-634 DE-706 |
physical | 1 online resource (xxvi, 273 pages) illustrations |
psigel | ZDB-32-STB ZDB-33-ESD ZDB-33-EBS ZDB-4-NLEBK ZDB-33-EBS BTU_PDA_EBS_Kauf ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD ZDB-4-NLEBK UBY01_DDA20 |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress |
record_format | marc |
series2 | Syngress advanced topics in information security |
spelling | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems edited by Edward Griffor Cambridge, MA Syngress [2017] 2017 1 online resource (xxvi, 273 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Syngress advanced topics in information security Description based on online resource; title from title page (Safari, viewed November 10, 2016) Computer security Computer networks Security measures Cyber intelligence (Computer security) Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Unternehmen (DE-588)4061963-1 s Informationssystem (DE-588)4072806-7 s Griffor, Edward R. edt http://www.sciencedirect.com/science/book/9780128037737 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems Computer security Computer networks Security measures Cyber intelligence (Computer security) Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Informationssystem (DE-588)4072806-7 gnd Datensicherung (DE-588)4011144-1 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4072806-7 (DE-588)4011144-1 (DE-588)4061963-1 |
title | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems |
title_auth | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems |
title_exact_search | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems |
title_full | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems edited by Edward Griffor |
title_fullStr | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems edited by Edward Griffor |
title_full_unstemmed | Handbook of system safety and security cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems edited by Edward Griffor |
title_short | Handbook of system safety and security |
title_sort | handbook of system safety and security cyber risk and risk management cyber security threat analysis functional safety software systems and cyber physical systems |
title_sub | cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems |
topic | Computer security Computer networks Security measures Cyber intelligence (Computer security) Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Informationssystem (DE-588)4072806-7 gnd Datensicherung (DE-588)4011144-1 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Computer security Computer networks Security measures Cyber intelligence (Computer security) Rechnernetz Computersicherheit Informationssystem Datensicherung Unternehmen |
url | http://www.sciencedirect.com/science/book/9780128037737 |
work_keys_str_mv | AT grifforedwardr handbookofsystemsafetyandsecuritycyberriskandriskmanagementcybersecuritythreatanalysisfunctionalsafetysoftwaresystemsandcyberphysicalsystems |