From problem toward solution: wireless sensor networks security
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
New York
Nova Science Publishers
c2009
|
Schriftenreihe: | Distributed, cluster, and grid computing
|
Schlagworte: | |
Beschreibung: | xii, 382 p. |
ISBN: | 160456458X 9781604564587 9781612097329 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044850502 | ||
003 | DE-604 | ||
005 | 20180305 | ||
007 | cr|uuu---uuuuu | ||
008 | 180305s2009 |||| o||u| ||||||eng d | ||
020 | |a 160456458X |9 1-60456-458-X | ||
020 | |a 9781604564587 |9 978-1-60456-458-7 | ||
020 | |a 9781612097329 |9 978-1-61209-732-9 | ||
035 | |a (ZDB-38-ESG)ebr10662797 | ||
035 | |a (OCoLC)694792705 | ||
035 | |a (DE-599)BVBBV044850502 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 681/.25 |2 22 | |
245 | 1 | 0 | |a From problem toward solution |b wireless sensor networks security |c Zhen Jiang and Yi Pan, editors |
264 | 1 | |a New York |b Nova Science Publishers |c c2009 | |
300 | |a xii, 382 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Distributed, cluster, and grid computing | |
505 | 8 | |a Includes bibliographical references and index | |
650 | 4 | |a Sensor networks |x Security measures | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 4 | |a Wireless metropolitan area networks |x Security measures | |
650 | 4 | |a Ad hoc networks (Computer networks) |x Security measures | |
700 | 1 | |a Jiang, Zhen |e Sonstige |4 oth | |
700 | 1 | |a Pan, Yi |d 1960- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 1-60456-457-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-60456-457-0 |
912 | |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030245362 |
Datensatz im Suchindex
_version_ | 1804178366404755456 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV044850502 |
collection | ZDB-38-ESG |
contents | Includes bibliographical references and index |
ctrlnum | (ZDB-38-ESG)ebr10662797 (OCoLC)694792705 (DE-599)BVBBV044850502 |
dewey-full | 681/.25 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 681 - Precision instruments and other devices |
dewey-raw | 681/.25 |
dewey-search | 681/.25 |
dewey-sort | 3681 225 |
dewey-tens | 680 - Manufacture of products for specific uses |
discipline | Handwerk und Gewerbe / Verschiedene Technologien |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01486nmm a2200409zc 4500</leader><controlfield tag="001">BV044850502</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180305 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180305s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">160456458X</subfield><subfield code="9">1-60456-458-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781604564587</subfield><subfield code="9">978-1-60456-458-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781612097329</subfield><subfield code="9">978-1-61209-732-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-ESG)ebr10662797</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)694792705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044850502</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">681/.25</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From problem toward solution</subfield><subfield code="b">wireless sensor networks security</subfield><subfield code="c">Zhen Jiang and Yi Pan, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Nova Science Publishers</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 382 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Distributed, cluster, and grid computing</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless metropolitan area networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ad hoc networks (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jiang, Zhen</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pan, Yi</subfield><subfield code="d">1960-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-60456-457-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-60456-457-0</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030245362</subfield></datafield></record></collection> |
id | DE-604.BV044850502 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:02:50Z |
institution | BVB |
isbn | 160456458X 9781604564587 9781612097329 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030245362 |
oclc_num | 694792705 |
open_access_boolean | |
physical | xii, 382 p. |
psigel | ZDB-38-ESG |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Nova Science Publishers |
record_format | marc |
series2 | Distributed, cluster, and grid computing |
spelling | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors New York Nova Science Publishers c2009 xii, 382 p. txt rdacontent c rdamedia cr rdacarrier Distributed, cluster, and grid computing Includes bibliographical references and index Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures Jiang, Zhen Sonstige oth Pan, Yi 1960- Sonstige oth Erscheint auch als Druck-Ausgabe, Hardcover 1-60456-457-1 Erscheint auch als Druck-Ausgabe, Hardcover 978-1-60456-457-0 |
spellingShingle | From problem toward solution wireless sensor networks security Includes bibliographical references and index Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures |
title | From problem toward solution wireless sensor networks security |
title_auth | From problem toward solution wireless sensor networks security |
title_exact_search | From problem toward solution wireless sensor networks security |
title_full | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors |
title_fullStr | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors |
title_full_unstemmed | From problem toward solution wireless sensor networks security Zhen Jiang and Yi Pan, editors |
title_short | From problem toward solution |
title_sort | from problem toward solution wireless sensor networks security |
title_sub | wireless sensor networks security |
topic | Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures |
topic_facet | Sensor networks Security measures Wireless LANs Security measures Wireless metropolitan area networks Security measures Ad hoc networks (Computer networks) Security measures |
work_keys_str_mv | AT jiangzhen fromproblemtowardsolutionwirelesssensornetworkssecurity AT panyi fromproblemtowardsolutionwirelesssensornetworkssecurity |