Security and privacy management, techniques, and protocols:
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2018]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-20 DE-898 DE-83 Volltext |
Zusammenfassung: | "This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"... |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxi, 426 Seiten) |
ISBN: | 9781522555841 |
DOI: | 10.4018/978-1-5225-5583-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044895215 | ||
003 | DE-604 | ||
005 | 20190729 | ||
007 | cr|uuu---uuuuu | ||
008 | 180409s2018 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522555841 |9 978-1-5225-5584-1 | ||
024 | 7 | |a 10.4018/978-1-5225-5583-4 |2 doi | |
035 | |a (OCoLC)1031053324 | ||
035 | |a (DE-599)BVBBV044895215 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-706 |a DE-573 |a DE-91 |a DE-20 |a DE-898 |a DE-83 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Security and privacy management, techniques, and protocols |c Yassine Maleh (University Hassan I, Morocco) |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (xxi, 426 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"... | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Privacy, Right of | |
700 | 1 | |a Maleh, Yassine |d 1987- |0 (DE-588)1190215594 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-5583-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-5583-8 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-5583-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-5583-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5583-4 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5583-4 |l DE-706 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5583-4 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5583-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079015899267072 |
---|---|
adam_text | |
any_adam_object | |
author2 | Maleh, Yassine 1987- |
author2_role | edt |
author2_variant | y m ym |
author_GND | (DE-588)1190215594 |
author_facet | Maleh, Yassine 1987- |
building | Verbundindex |
bvnumber | BV044895215 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1031053324 (DE-599)BVBBV044895215 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-5583-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044895215</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190729</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180409s2018 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522555841</subfield><subfield code="9">978-1-5225-5584-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5583-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1031053324</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044895215</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy management, techniques, and protocols</subfield><subfield code="c">Yassine Maleh (University Hassan I, Morocco)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 426 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maleh, Yassine</subfield><subfield code="d">1987-</subfield><subfield code="0">(DE-588)1190215594</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-5583-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-5583-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-5583-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5583-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044895215 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:16Z |
institution | BVB |
isbn | 9781522555841 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030289136 |
oclc_num | 1031053324 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxi, 426 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE18 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Security and privacy management, techniques, and protocols Yassine Maleh (University Hassan I, Morocco) Hershey PA, USA IGI Global, Disseminator of Knowledge [2018] © 2018 1 Online-Ressource (xxi, 426 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source Includes bibliographical references and index "This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"... Computer networks Security measures Privacy, Right of Maleh, Yassine 1987- (DE-588)1190215594 edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-5583-4 Erscheint auch als Druck-Ausgabe 1-5225-5583-8 https://doi.org/10.4018/978-1-5225-5583-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security and privacy management, techniques, and protocols Computer networks Security measures Privacy, Right of |
title | Security and privacy management, techniques, and protocols |
title_auth | Security and privacy management, techniques, and protocols |
title_exact_search | Security and privacy management, techniques, and protocols |
title_full | Security and privacy management, techniques, and protocols Yassine Maleh (University Hassan I, Morocco) |
title_fullStr | Security and privacy management, techniques, and protocols Yassine Maleh (University Hassan I, Morocco) |
title_full_unstemmed | Security and privacy management, techniques, and protocols Yassine Maleh (University Hassan I, Morocco) |
title_short | Security and privacy management, techniques, and protocols |
title_sort | security and privacy management techniques and protocols |
topic | Computer networks Security measures Privacy, Right of |
topic_facet | Computer networks Security measures Privacy, Right of |
url | https://doi.org/10.4018/978-1-5225-5583-4 |
work_keys_str_mv | AT malehyassine securityandprivacymanagementtechniquesandprotocols |