Cyber security and threats: concepts, methodologies, tools, and applications
"This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global, Disseminator of Knowledge
[2018]
|
Schriftenreihe: | Critical explorations
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-20 DE-898 DE-83 Volltext |
Zusammenfassung: | "This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"... |
Beschreibung: | Includes bibliographical references and index Druckausgabe in 3 Bänden erschienen |
Beschreibung: | 1 Online-Ressource (xxi, 1711 Seiten, Seite xxii-xxxi) |
ISBN: | 9781522556350 |
DOI: | 10.4018/978-1-5225-5634-3 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044895295 | ||
003 | DE-604 | ||
005 | 20190717 | ||
007 | cr|uuu---uuuuu | ||
008 | 180409s2018 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522556350 |9 978-1-5225-5635-0 | ||
024 | 7 | |a 10.4018/978-1-5225-5634-3 |2 doi | |
035 | |a (OCoLC)1031049387 | ||
035 | |a (DE-599)BVBBV044895295 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-706 |a DE-573 |a DE-91 |a DE-20 |a DE-898 |a DE-83 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Cyber security and threats |b concepts, methodologies, tools, and applications |c Information Resources Management Association, USA |
246 | 1 | 3 | |a Cybersecurity and threats |
264 | 1 | |a Hershey PA, USA |b IGI Global, Disseminator of Knowledge |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (xxi, 1711 Seiten, Seite xxii-xxxi) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Critical explorations | |
500 | |a Includes bibliographical references and index | ||
500 | |a Druckausgabe in 3 Bänden erschienen | ||
520 | |a "This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"... | ||
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
710 | 2 | |a Information Resources Management Association |0 (DE-588)5010976-5 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-5634-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-5634-6 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-5634-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-5634-3 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5634-3 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5634-3 |l DE-706 |p ZDB-1-IGE |q ZDB-1-IGE18 |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5634-3 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5634-3 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5634-3 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5634-3 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5634-3 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079015901364224 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV044895295 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1031049387 (DE-599)BVBBV044895295 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-5634-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044895295</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190717</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180409s2018 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522556350</subfield><subfield code="9">978-1-5225-5635-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5634-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1031049387</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044895295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security and threats</subfield><subfield code="b">concepts, methodologies, tools, and applications</subfield><subfield code="c">Information Resources Management Association, USA</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cybersecurity and threats</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 1711 Seiten, Seite xxii-xxxi)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Critical explorations</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Druckausgabe in 3 Bänden erschienen</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Information Resources Management Association</subfield><subfield code="0">(DE-588)5010976-5</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-5634-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-5634-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-5634-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE18</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5634-3</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044895295 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:16Z |
institution | BVB |
institution_GND | (DE-588)5010976-5 |
isbn | 9781522556350 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030289209 |
oclc_num | 1031049387 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1050 DE-1049 DE-706 DE-573 DE-91 DE-BY-TUM DE-20 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxi, 1711 Seiten, Seite xxii-xxxi) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE18 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Critical explorations |
spelling | Cyber security and threats concepts, methodologies, tools, and applications Information Resources Management Association, USA Cybersecurity and threats Hershey PA, USA IGI Global, Disseminator of Knowledge [2018] © 2018 1 Online-Ressource (xxi, 1711 Seiten, Seite xxii-xxxi) txt rdacontent c rdamedia cr rdacarrier Critical explorations Includes bibliographical references and index Druckausgabe in 3 Bänden erschienen "This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"... Internet Security measures Computer crimes Prevention Information Resources Management Association (DE-588)5010976-5 isb Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-5634-3 Erscheint auch als Druck-Ausgabe 1-5225-5634-6 https://doi.org/10.4018/978-1-5225-5634-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber security and threats concepts, methodologies, tools, and applications Internet Security measures Computer crimes Prevention |
title | Cyber security and threats concepts, methodologies, tools, and applications |
title_alt | Cybersecurity and threats |
title_auth | Cyber security and threats concepts, methodologies, tools, and applications |
title_exact_search | Cyber security and threats concepts, methodologies, tools, and applications |
title_full | Cyber security and threats concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_fullStr | Cyber security and threats concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_full_unstemmed | Cyber security and threats concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_short | Cyber security and threats |
title_sort | cyber security and threats concepts methodologies tools and applications |
title_sub | concepts, methodologies, tools, and applications |
topic | Internet Security measures Computer crimes Prevention |
topic_facet | Internet Security measures Computer crimes Prevention |
url | https://doi.org/10.4018/978-1-5225-5634-3 |
work_keys_str_mv | AT informationresourcesmanagementassociation cybersecurityandthreatsconceptsmethodologiestoolsandapplications AT informationresourcesmanagementassociation cybersecurityandthreats |