Securing information and communications systems: principles, technologies, and applications
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
c2008
|
Schriftenreihe: | Artech House computer security series
Artech House information security and privacy series |
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xiv, 362 p. |
ISBN: | 1596932287 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044138047 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2008 |||| o||u| ||||||eng d | ||
020 | |a 1596932287 |c cased |9 1-59693-228-7 | ||
035 | |a (ZDB-30-PAD)EBC456881 | ||
035 | |a (ZDB-89-EBL)EBL456881 | ||
035 | |a (OCoLC)434586632 | ||
035 | |a (DE-599)BVBBV044138047 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Securing information and communications systems |b principles, technologies, and applications |c Steven M. Furnell ... [et al.], editors |
264 | 1 | |a Boston |b Artech House |c c2008 | |
300 | |a xiv, 362 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House computer security series | |
490 | 0 | |a Artech House information security and privacy series | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Betriebliches Informationssystem |0 (DE-588)4069386-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Furnell, Steven |d 1970- |e Sonstige |4 oth | |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029544892 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177231519416320 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV044138047 |
collection | ZDB-30-PAD |
ctrlnum | (ZDB-30-PAD)EBC456881 (ZDB-89-EBL)EBL456881 (OCoLC)434586632 (DE-599)BVBBV044138047 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01618nmm a2200433zc 4500</leader><controlfield tag="001">BV044138047</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932287</subfield><subfield code="c">cased</subfield><subfield code="9">1-59693-228-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC456881</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL456881</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)434586632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044138047</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing information and communications systems</subfield><subfield code="b">principles, technologies, and applications</subfield><subfield code="c">Steven M. Furnell ... [et al.], editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 362 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betriebliches Informationssystem</subfield><subfield code="0">(DE-588)4069386-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="d">1970-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029544892</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044138047 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:44:47Z |
institution | BVB |
isbn | 1596932287 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029544892 |
oclc_num | 434586632 |
open_access_boolean | |
physical | xiv, 362 p. |
psigel | ZDB-30-PAD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computer security series Artech House information security and privacy series |
spelling | Securing information and communications systems principles, technologies, and applications Steven M. Furnell ... [et al.], editors Boston Artech House c2008 xiv, 362 p. txt rdacontent c rdamedia cr rdacarrier Artech House computer security series Artech House information security and privacy series Includes bibliographical references and index Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 gnd rswk-swf Betriebliches Informationssystem (DE-588)4069386-7 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Furnell, Steven 1970- Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Securing information and communications systems principles, technologies, and applications Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4069386-7 |
title | Securing information and communications systems principles, technologies, and applications |
title_auth | Securing information and communications systems principles, technologies, and applications |
title_exact_search | Securing information and communications systems principles, technologies, and applications |
title_full | Securing information and communications systems principles, technologies, and applications Steven M. Furnell ... [et al.], editors |
title_fullStr | Securing information and communications systems principles, technologies, and applications Steven M. Furnell ... [et al.], editors |
title_full_unstemmed | Securing information and communications systems principles, technologies, and applications Steven M. Furnell ... [et al.], editors |
title_short | Securing information and communications systems |
title_sort | securing information and communications systems principles technologies and applications |
title_sub | principles, technologies, and applications |
topic | Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd Betriebliches Informationssystem (DE-588)4069386-7 gnd |
topic_facet | Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit Betriebliches Informationssystem |
work_keys_str_mv | AT furnellsteven securinginformationandcommunicationssystemsprinciplestechnologiesandapplications |