Cybersecurity breaches and issues surrounding online threat protection:
"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffu...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA
IGI Global, Disseminator of Knowledge
[2017]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-573 DE-91 DE-706 DE-20 DE-1049 DE-898 DE-83 Volltext |
Zusammenfassung: | "[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology" - Provided by publisher |
Beschreibung: | 1 Online-Ressource (xxi, 408 Seiten) |
ISBN: | 9781522519423 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044955036 | ||
003 | DE-604 | ||
005 | 20190801 | ||
007 | cr|uuu---uuuuu | ||
008 | 180522s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781522519423 |9 978-1-5225-1942-3 | ||
024 | 7 | |a 10.4018/978-1-5225-1941-6 |2 doi | |
035 | |a (ZDB-1-IGE)00169252 | ||
035 | |a (OCoLC)1037901737 | ||
035 | |a (DE-599)BVBBV044955036 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-1050 |a DE-706 |a DE-20 |a DE-1049 |a DE-898 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Cybersecurity breaches and issues surrounding online threat protection |c Michelle Moore (George Mason University, USA) |
264 | 1 | |a Hershey PA |b IGI Global, Disseminator of Knowledge |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 Online-Ressource (xxi, 408 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
520 | |a "[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology" - Provided by publisher | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Cloud computing / Security measures | |
700 | 1 | |a Moore, Michelle |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5225-1941-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-5225-1941-6 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079016291434496 |
---|---|
adam_text | |
any_adam_object | |
author2 | Moore, Michelle |
author2_role | edt |
author2_variant | m m mm |
author_facet | Moore, Michelle |
building | Verbundindex |
bvnumber | BV044955036 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00169252 (OCoLC)1037901737 (DE-599)BVBBV044955036 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044955036</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190801</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180522s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522519423</subfield><subfield code="9">978-1-5225-1942-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-1941-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00169252</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037901737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044955036</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity breaches and issues surrounding online threat protection</subfield><subfield code="c">Michelle Moore (George Mason University, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 408 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moore, Michelle</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5225-1941-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-5225-1941-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044955036 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:16Z |
institution | BVB |
isbn | 9781522519423 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030347724 |
oclc_num | 1037901737 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-1050 DE-706 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-1050 DE-706 DE-20 DE-1049 DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource (xxi, 408 Seiten) |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Cybersecurity breaches and issues surrounding online threat protection Michelle Moore (George Mason University, USA) Hershey PA IGI Global, Disseminator of Knowledge [2017] © 2017 1 Online-Ressource (xxi, 408 Seiten) txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source "[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology" - Provided by publisher Computer networks / Security measures Cloud computing / Security measures Moore, Michelle edt Erscheint auch als Druck-Ausgabe 978-1-5225-1941-6 Erscheint auch als Druck-Ausgabe 1-5225-1941-6 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cybersecurity breaches and issues surrounding online threat protection Computer networks / Security measures Cloud computing / Security measures |
title | Cybersecurity breaches and issues surrounding online threat protection |
title_auth | Cybersecurity breaches and issues surrounding online threat protection |
title_exact_search | Cybersecurity breaches and issues surrounding online threat protection |
title_full | Cybersecurity breaches and issues surrounding online threat protection Michelle Moore (George Mason University, USA) |
title_fullStr | Cybersecurity breaches and issues surrounding online threat protection Michelle Moore (George Mason University, USA) |
title_full_unstemmed | Cybersecurity breaches and issues surrounding online threat protection Michelle Moore (George Mason University, USA) |
title_short | Cybersecurity breaches and issues surrounding online threat protection |
title_sort | cybersecurity breaches and issues surrounding online threat protection |
topic | Computer networks / Security measures Cloud computing / Security measures |
topic_facet | Computer networks / Security measures Cloud computing / Security measures |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1941-6 |
work_keys_str_mv | AT mooremichelle cybersecuritybreachesandissuessurroundingonlinethreatprotection |