Cyber security standards, practices and industrial applications: systems and methodologies
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
Information Science Reference
[2012]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-188 DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Beschreibung: | 1 Online-Ressource (xviii, 316 Seiten) |
ISBN: | 9781609608521 9781609608538 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044319933 | ||
003 | DE-604 | ||
005 | 20200323 | ||
007 | cr|uuu---uuuuu | ||
008 | 170519s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781609608521 |c Online |9 978-1-60960-852-1 | ||
020 | |a 9781609608538 |c print & perpetual access |9 978-1-60960-853-8 | ||
024 | 7 | |a 10.4018/978-1-60960-851-4 |2 doi | |
035 | |a (OCoLC)891080466 | ||
035 | |a (DE-599)BVBBV044319933 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-188 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
100 | 1 | |a Zubairi, Junaid Ahmed |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber security standards, practices and industrial applications |b systems and methodologies |c Junaid Ahmed Zubairi (State University of New York at Fredonia, USA), Athar Mahboob (National University of Sciences & Technology, Pakistan) |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2012] | |
264 | 4 | |c © 2012 | |
300 | |a 1 Online-Ressource (xviii, 316 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Electronic data processing departments / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mahboob, Athar |e Verfasser |0 (DE-588)1193108799 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-60960-851-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-60960-851-8 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-4-EBA |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029723422 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715 |l DE-188 |p ZDB-4-EBA |q ZDB-4-EBA 2018 |x Aggregator |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-851-4 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-851-4 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-851-4 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-60960-851-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138509227130880 |
---|---|
adam_text | |
any_adam_object | |
author | Zubairi, Junaid Ahmed Mahboob, Athar |
author_GND | (DE-588)1193108799 |
author_facet | Zubairi, Junaid Ahmed Mahboob, Athar |
author_role | aut aut |
author_sort | Zubairi, Junaid Ahmed |
author_variant | j a z ja jaz a m am |
building | Verbundindex |
bvnumber | BV044319933 |
collection | ZDB-98-IGB ZDB-4-EBA ZDB-1-IGE |
ctrlnum | (OCoLC)891080466 (DE-599)BVBBV044319933 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044319933</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200323</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170519s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609608521</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-60960-852-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781609608538</subfield><subfield code="c">print & perpetual access</subfield><subfield code="9">978-1-60960-853-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-60960-851-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891080466</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044319933</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zubairi, Junaid Ahmed</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security standards, practices and industrial applications</subfield><subfield code="b">systems and methodologies</subfield><subfield code="c">Junaid Ahmed Zubairi (State University of New York at Fredonia, USA), Athar Mahboob (National University of Sciences & Technology, Pakistan)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2012]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 316 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mahboob, Athar</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1193108799</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-60960-851-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-60960-851-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029723422</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=389715</subfield><subfield code="l">DE-188</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">ZDB-4-EBA 2018</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-851-4</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-851-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-851-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-60960-851-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044319933 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:07:36Z |
institution | BVB |
isbn | 9781609608521 9781609608538 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029723422 |
oclc_num | 891080466 |
open_access_boolean | |
owner | DE-706 DE-188 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-188 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xviii, 316 Seiten) |
psigel | ZDB-98-IGB ZDB-4-EBA ZDB-1-IGE ZDB-4-EBA ZDB-4-EBA 2018 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Zubairi, Junaid Ahmed Verfasser aut Cyber security standards, practices and industrial applications systems and methodologies Junaid Ahmed Zubairi (State University of New York at Fredonia, USA), Athar Mahboob (National University of Sciences & Technology, Pakistan) Hershey PA Information Science Reference [2012] © 2012 1 Online-Ressource (xviii, 316 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Computer networks / Security measures Computer security Data protection Electronic data processing departments / Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Mahboob, Athar Verfasser (DE-588)1193108799 aut Erscheint auch als Druck-Ausgabe, Hardcover 978-1-60960-851-4 Erscheint auch als Druck-Ausgabe 1-60960-851-8 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Zubairi, Junaid Ahmed Mahboob, Athar Cyber security standards, practices and industrial applications systems and methodologies Computer networks / Security measures Computer security Data protection Electronic data processing departments / Security measures Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4143413-4 |
title | Cyber security standards, practices and industrial applications systems and methodologies |
title_auth | Cyber security standards, practices and industrial applications systems and methodologies |
title_exact_search | Cyber security standards, practices and industrial applications systems and methodologies |
title_full | Cyber security standards, practices and industrial applications systems and methodologies Junaid Ahmed Zubairi (State University of New York at Fredonia, USA), Athar Mahboob (National University of Sciences & Technology, Pakistan) |
title_fullStr | Cyber security standards, practices and industrial applications systems and methodologies Junaid Ahmed Zubairi (State University of New York at Fredonia, USA), Athar Mahboob (National University of Sciences & Technology, Pakistan) |
title_full_unstemmed | Cyber security standards, practices and industrial applications systems and methodologies Junaid Ahmed Zubairi (State University of New York at Fredonia, USA), Athar Mahboob (National University of Sciences & Technology, Pakistan) |
title_short | Cyber security standards, practices and industrial applications |
title_sort | cyber security standards practices and industrial applications systems and methodologies |
title_sub | systems and methodologies |
topic | Computer networks / Security measures Computer security Data protection Electronic data processing departments / Security measures Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks / Security measures Computer security Data protection Electronic data processing departments / Security measures Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-851-4 |
work_keys_str_mv | AT zubairijunaidahmed cybersecuritystandardspracticesandindustrialapplicationssystemsandmethodologies AT mahboobathar cybersecuritystandardspracticesandindustrialapplicationssystemsandmethodologies |