Data Transportation and Protection:
A new breed of engineer is developing in our contemporary society. These engineers are concerned with communications and computers, economics and regulation. These new engineers apply themselves to data-to its pack aging, transmission, and protection. They are data engineers. Formal curricula do no...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
1986
|
Schriftenreihe: | Applications of Communications Theory
|
Schlagworte: | |
Online-Zugang: | BTU01 Volltext |
Zusammenfassung: | A new breed of engineer is developing in our contemporary society. These engineers are concerned with communications and computers, economics and regulation. These new engineers apply themselves to data-to its pack aging, transmission, and protection. They are data engineers. Formal curricula do not yet exist for their dedicated development. Rather they learn most of their tools "on the job" and their roots are in computer engineering, communications engineering, and applied mathe matics. There is a need to draw relevant material together and present it so that those who wish to become data engineers can do so, for the betterment of themselves, their employer, their country, and, ultimately, the world-for we share the belief that the most effective tool for world peace and stability is neither politics nor armaments, but rather the open and timely exchange of information. This book has been written with that goal in mind. Today numerous signs encourage us to expect broader information exchange in the years to come. The movement toward a true Integrated Services Digital Network (ISDN) is perhaps the clearest of these. Also, the development offormal protocol layers reflects both a great deal of brilliance and compromise and also the desire for a common language among data engineers |
Beschreibung: | 1 Online-Ressource (508 p) |
ISBN: | 9781461321958 |
DOI: | 10.1007/978-1-4613-2195-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045186342 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180912s1986 |||| o||u| ||||||eng d | ||
020 | |a 9781461321958 |9 978-1-4613-2195-8 | ||
024 | 7 | |a 10.1007/978-1-4613-2195-8 |2 doi | |
035 | |a (ZDB-2-ENG)978-1-4613-2195-8 | ||
035 | |a (OCoLC)1053845661 | ||
035 | |a (DE-599)BVBBV045186342 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 005.74 |2 23 | |
100 | 1 | |a Hershey, John E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data Transportation and Protection |c by John E. Hershey, R. K. Rao Yarlagadda |
264 | 1 | |a Boston, MA |b Springer US |c 1986 | |
300 | |a 1 Online-Ressource (508 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Applications of Communications Theory | |
520 | |a A new breed of engineer is developing in our contemporary society. These engineers are concerned with communications and computers, economics and regulation. These new engineers apply themselves to data-to its pack aging, transmission, and protection. They are data engineers. Formal curricula do not yet exist for their dedicated development. Rather they learn most of their tools "on the job" and their roots are in computer engineering, communications engineering, and applied mathe matics. There is a need to draw relevant material together and present it so that those who wish to become data engineers can do so, for the betterment of themselves, their employer, their country, and, ultimately, the world-for we share the belief that the most effective tool for world peace and stability is neither politics nor armaments, but rather the open and timely exchange of information. This book has been written with that goal in mind. Today numerous signs encourage us to expect broader information exchange in the years to come. The movement toward a true Integrated Services Digital Network (ISDN) is perhaps the clearest of these. Also, the development offormal protocol layers reflects both a great deal of brilliance and compromise and also the desire for a common language among data engineers | ||
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Computer Science, general | |
650 | 4 | |a Electrical Engineering | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Electrical engineering | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenübertragung |0 (DE-588)4011150-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenübertragung |0 (DE-588)4011150-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Rao Yarlagadda, R. K. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461292906 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4613-2195-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_Archiv | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030575519 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-1-4613-2195-8 |l BTU01 |p ZDB-2-ENG |q ZDB-2-ENG_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178877234282496 |
---|---|
any_adam_object | |
author | Hershey, John E. Rao Yarlagadda, R. K. |
author_facet | Hershey, John E. Rao Yarlagadda, R. K. |
author_role | aut aut |
author_sort | Hershey, John E. |
author_variant | j e h je jeh y r k r yrk yrkr |
building | Verbundindex |
bvnumber | BV045186342 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-1-4613-2195-8 (OCoLC)1053845661 (DE-599)BVBBV045186342 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4613-2195-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03387nmm a2200565zc 4500</leader><controlfield tag="001">BV045186342</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180912s1986 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461321958</subfield><subfield code="9">978-1-4613-2195-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4613-2195-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-1-4613-2195-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1053845661</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045186342</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hershey, John E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data Transportation and Protection</subfield><subfield code="c">by John E. Hershey, R. K. Rao Yarlagadda</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">1986</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (508 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Applications of Communications Theory</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A new breed of engineer is developing in our contemporary society. These engineers are concerned with communications and computers, economics and regulation. These new engineers apply themselves to data-to its pack aging, transmission, and protection. They are data engineers. Formal curricula do not yet exist for their dedicated development. Rather they learn most of their tools "on the job" and their roots are in computer engineering, communications engineering, and applied mathe matics. There is a need to draw relevant material together and present it so that those who wish to become data engineers can do so, for the betterment of themselves, their employer, their country, and, ultimately, the world-for we share the belief that the most effective tool for world peace and stability is neither politics nor armaments, but rather the open and timely exchange of information. This book has been written with that goal in mind. Today numerous signs encourage us to expect broader information exchange in the years to come. The movement toward a true Integrated Services Digital Network (ISDN) is perhaps the clearest of these. Also, the development offormal protocol layers reflects both a great deal of brilliance and compromise and also the desire for a common language among data engineers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rao Yarlagadda, R. K.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461292906</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4613-2195-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_Archiv</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030575519</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4613-2195-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045186342 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:57Z |
institution | BVB |
isbn | 9781461321958 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030575519 |
oclc_num | 1053845661 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | 1 Online-Ressource (508 p) |
psigel | ZDB-2-ENG ZDB-2-ENG_Archiv ZDB-2-ENG ZDB-2-ENG_Archiv |
publishDate | 1986 |
publishDateSearch | 1986 |
publishDateSort | 1986 |
publisher | Springer US |
record_format | marc |
series2 | Applications of Communications Theory |
spelling | Hershey, John E. Verfasser aut Data Transportation and Protection by John E. Hershey, R. K. Rao Yarlagadda Boston, MA Springer US 1986 1 Online-Ressource (508 p) txt rdacontent c rdamedia cr rdacarrier Applications of Communications Theory A new breed of engineer is developing in our contemporary society. These engineers are concerned with communications and computers, economics and regulation. These new engineers apply themselves to data-to its pack aging, transmission, and protection. They are data engineers. Formal curricula do not yet exist for their dedicated development. Rather they learn most of their tools "on the job" and their roots are in computer engineering, communications engineering, and applied mathe matics. There is a need to draw relevant material together and present it so that those who wish to become data engineers can do so, for the betterment of themselves, their employer, their country, and, ultimately, the world-for we share the belief that the most effective tool for world peace and stability is neither politics nor armaments, but rather the open and timely exchange of information. This book has been written with that goal in mind. Today numerous signs encourage us to expect broader information exchange in the years to come. The movement toward a true Integrated Services Digital Network (ISDN) is perhaps the clearest of these. Also, the development offormal protocol layers reflects both a great deal of brilliance and compromise and also the desire for a common language among data engineers Computer Science Data Structures, Cryptology and Information Theory Computer Science, general Electrical Engineering Computer Communication Networks Computer science Computer communication systems Data structures (Computer science) Electrical engineering Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenübertragung (DE-588)4011150-7 gnd rswk-swf Datenübertragung (DE-588)4011150-7 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Rao Yarlagadda, R. K. aut Erscheint auch als Druck-Ausgabe 9781461292906 https://doi.org/10.1007/978-1-4613-2195-8 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hershey, John E. Rao Yarlagadda, R. K. Data Transportation and Protection Computer Science Data Structures, Cryptology and Information Theory Computer Science, general Electrical Engineering Computer Communication Networks Computer science Computer communication systems Data structures (Computer science) Electrical engineering Datensicherung (DE-588)4011144-1 gnd Datenübertragung (DE-588)4011150-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4011150-7 |
title | Data Transportation and Protection |
title_auth | Data Transportation and Protection |
title_exact_search | Data Transportation and Protection |
title_full | Data Transportation and Protection by John E. Hershey, R. K. Rao Yarlagadda |
title_fullStr | Data Transportation and Protection by John E. Hershey, R. K. Rao Yarlagadda |
title_full_unstemmed | Data Transportation and Protection by John E. Hershey, R. K. Rao Yarlagadda |
title_short | Data Transportation and Protection |
title_sort | data transportation and protection |
topic | Computer Science Data Structures, Cryptology and Information Theory Computer Science, general Electrical Engineering Computer Communication Networks Computer science Computer communication systems Data structures (Computer science) Electrical engineering Datensicherung (DE-588)4011144-1 gnd Datenübertragung (DE-588)4011150-7 gnd |
topic_facet | Computer Science Data Structures, Cryptology and Information Theory Computer Science, general Electrical Engineering Computer Communication Networks Computer science Computer communication systems Data structures (Computer science) Electrical engineering Datensicherung Datenübertragung |
url | https://doi.org/10.1007/978-1-4613-2195-8 |
work_keys_str_mv | AT hersheyjohne datatransportationandprotection AT raoyarlagaddark datatransportationandprotection |