Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | German |
Veröffentlicht: |
Berlin, Heidelberg
SpringerVieweg
2018
|
Schlagworte: | |
Online-Zugang: | BFB01 BHS01 BTU01 BTW01 FAB01 FAN01 FAW01 FCO01 FFW01 FHA01 FHD01 FHI01 FHM01 FHN01 FHO01 FHR01 FKE01 FLA01 FNU01 FRO01 FWS01 FWS02 HTW01 HWR01 TUM01 UBM01 UBT01 UBW01 UBY01 UER01 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (XXII, 347 Seiten 72 Abb., 14 Abb. in Farbe) |
ISBN: | 9783662560846 |
DOI: | 10.1007/978-3-662-56084-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045238908 | ||
003 | DE-604 | ||
005 | 20190620 | ||
007 | cr|uuu---uuuuu | ||
008 | 181018s2018 |||| o||u| ||||||ger d | ||
020 | |a 9783662560846 |c Online |9 978-3-662-56084-6 | ||
024 | 7 | |a 10.1007/978-3-662-56084-6 |2 doi | |
035 | |a (ZDB-2-STI)9783662560846 | ||
035 | |a (OCoLC)1057689144 | ||
035 | |a (DE-599)BVBBV045238908 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
049 | |a DE-860 |a DE-19 |a DE-1028 |a DE-83 |a DE-858 |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-1049 |a DE-29 |a DE-20 |a DE-862 |a DE-92 |a DE-522 |a DE-706 |a DE-91 |a DE-B768 |a DE-859 |a DE-523 |a DE-1050 |a DE-863 |a DE-1051 |a DE-2070s |a DE-573 |a DE-M347 |a DE-703 |a DE-1102 |a DE-634 |a DE-526 |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
084 | |a TEC 000 |2 stub | ||
245 | 1 | 0 | |a Cyber Situational Awareness in Public-Private-Partnerships |b Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen |c Florian Skopik, Tímea Páhi, Maria Leitner Hrsg. |
264 | 1 | |a Berlin, Heidelberg |b SpringerVieweg |c 2018 | |
300 | |a 1 Online-Ressource (XXII, 347 Seiten 72 Abb., 14 Abb. in Farbe) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
610 | 2 | 7 | |a Europäische Union |t NIS-Richtlinie |0 (DE-588)1117227561 |2 gnd |9 rswk-swf |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Legal Aspects of Computing | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Computers / Law and legislation | |
650 | 4 | |a Information Systems | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public Private Partnership |0 (DE-588)4337462-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Situation Awareness |0 (DE-588)7852143-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Situation Awareness |0 (DE-588)7852143-9 |D s |
689 | 1 | 2 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 1 | 3 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 1 | 4 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | 5 | |a Public Private Partnership |0 (DE-588)4337462-1 |D s |
689 | 1 | 6 | |a Europäische Union |t NIS-Richtlinie |0 (DE-588)1117227561 |D u |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Skopik, Florian |0 (DE-588)1100321047 |4 edt | |
700 | 1 | |a Páhi, Tímea |4 edt | |
700 | 1 | |a Leitner, Maria |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-662-56083-9 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-56084-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-STI | ||
940 | 1 | |q ZDB-2-STI_2018 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030627138 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l BFB01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l BHS01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l BTU01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l BTW01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FAB01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FAN01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FAW01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FCO01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FFW01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHA01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHD01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHI01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHM01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHN01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHO01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FHR01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FKE01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FLA01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FNU01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FRO01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FWS01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l FWS02 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l HTW01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l HWR01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l TUM01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l UBM01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l UBT01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l UBW01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l UBY01 |p ZDB-2-STI |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-56084-6 |l UER01 |p ZDB-2-STI |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 703966 |
---|---|
_version_ | 1806185079338172416 |
any_adam_object | |
author2 | Skopik, Florian Páhi, Tímea Leitner, Maria |
author2_role | edt edt edt |
author2_variant | f s fs t p tp m l ml |
author_GND | (DE-588)1100321047 |
author_facet | Skopik, Florian Páhi, Tímea Leitner, Maria |
building | Verbundindex |
bvnumber | BV045238908 |
classification_rvk | ST 276 |
classification_tum | DAT 000 TEC 000 |
collection | ZDB-2-STI |
ctrlnum | (ZDB-2-STI)9783662560846 (OCoLC)1057689144 (DE-599)BVBBV045238908 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Technik Technik Informatik |
doi_str_mv | 10.1007/978-3-662-56084-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06356nmm a2201129zc 4500</leader><controlfield tag="001">BV045238908</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190620 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181018s2018 |||| o||u| ||||||ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662560846</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-56084-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-56084-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-STI)9783662560846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1057689144</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045238908</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-2070s</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-526</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">TEC 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Situational Awareness in Public-Private-Partnerships</subfield><subfield code="b">Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen</subfield><subfield code="c">Florian Skopik, Tímea Páhi, Maria Leitner Hrsg.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">SpringerVieweg</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 347 Seiten 72 Abb., 14 Abb. in Farbe)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">Europäische Union</subfield><subfield code="t">NIS-Richtlinie</subfield><subfield code="0">(DE-588)1117227561</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public Private Partnership</subfield><subfield code="0">(DE-588)4337462-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Situation Awareness</subfield><subfield code="0">(DE-588)7852143-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Situation Awareness</subfield><subfield code="0">(DE-588)7852143-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Public Private Partnership</subfield><subfield code="0">(DE-588)4337462-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Europäische Union</subfield><subfield code="t">NIS-Richtlinie</subfield><subfield code="0">(DE-588)1117227561</subfield><subfield code="D">u</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skopik, Florian</subfield><subfield code="0">(DE-588)1100321047</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Páhi, Tímea</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Leitner, Maria</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-662-56083-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-STI</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-STI_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030627138</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">BHS01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">BTW01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FAN01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FFW01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FNU01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-56084-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-STI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045238908 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T13:38:39Z |
institution | BVB |
isbn | 9783662560846 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030627138 |
oclc_num | 1057689144 |
open_access_boolean | |
owner | DE-860 DE-19 DE-BY-UBM DE-1028 DE-83 DE-858 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-1049 DE-29 DE-20 DE-862 DE-BY-FWS DE-92 DE-522 DE-706 DE-91 DE-BY-TUM DE-B768 DE-859 DE-523 DE-1050 DE-863 DE-BY-FWS DE-1051 DE-2070s DE-573 DE-M347 DE-703 DE-1102 DE-634 DE-526 DE-11 |
owner_facet | DE-860 DE-19 DE-BY-UBM DE-1028 DE-83 DE-858 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-1049 DE-29 DE-20 DE-862 DE-BY-FWS DE-92 DE-522 DE-706 DE-91 DE-BY-TUM DE-B768 DE-859 DE-523 DE-1050 DE-863 DE-BY-FWS DE-1051 DE-2070s DE-573 DE-M347 DE-703 DE-1102 DE-634 DE-526 DE-11 |
physical | 1 Online-Ressource (XXII, 347 Seiten 72 Abb., 14 Abb. in Farbe) |
psigel | ZDB-2-STI ZDB-2-STI_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | SpringerVieweg |
record_format | marc |
spellingShingle | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen Europäische Union NIS-Richtlinie (DE-588)1117227561 gnd Systems and Data Security Security Computer Systems Organization and Communication Networks Legal Aspects of Computing Management of Computing and Information Systems Data protection Computer network architectures Computers / Law and legislation Information Systems Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Public Private Partnership (DE-588)4337462-1 gnd Computerkriminalität (DE-588)4010452-7 gnd Cyberattacke (DE-588)1075612675 gnd Situation Awareness (DE-588)7852143-9 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd |
subject_GND | (DE-588)1117227561 (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4337462-1 (DE-588)4010452-7 (DE-588)1075612675 (DE-588)7852143-9 (DE-588)7636254-1 (DE-588)4143413-4 |
title | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen |
title_auth | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen |
title_exact_search | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen |
title_full | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen Florian Skopik, Tímea Páhi, Maria Leitner Hrsg. |
title_fullStr | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen Florian Skopik, Tímea Páhi, Maria Leitner Hrsg. |
title_full_unstemmed | Cyber Situational Awareness in Public-Private-Partnerships Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen Florian Skopik, Tímea Páhi, Maria Leitner Hrsg. |
title_short | Cyber Situational Awareness in Public-Private-Partnerships |
title_sort | cyber situational awareness in public private partnerships organisationsubergreifende cyber sicherheitsvorfalle effektiv bewaltigen |
title_sub | Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen |
topic | Europäische Union NIS-Richtlinie (DE-588)1117227561 gnd Systems and Data Security Security Computer Systems Organization and Communication Networks Legal Aspects of Computing Management of Computing and Information Systems Data protection Computer network architectures Computers / Law and legislation Information Systems Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Public Private Partnership (DE-588)4337462-1 gnd Computerkriminalität (DE-588)4010452-7 gnd Cyberattacke (DE-588)1075612675 gnd Situation Awareness (DE-588)7852143-9 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd |
topic_facet | Europäische Union NIS-Richtlinie Systems and Data Security Security Computer Systems Organization and Communication Networks Legal Aspects of Computing Management of Computing and Information Systems Data protection Computer network architectures Computers / Law and legislation Information Systems Datenschutz Computersicherheit Public Private Partnership Computerkriminalität Cyberattacke Situation Awareness Kritische Informationsinfrastruktur Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-662-56084-6 |
work_keys_str_mv | AT skopikflorian cybersituationalawarenessinpublicprivatepartnershipsorganisationsubergreifendecybersicherheitsvorfalleeffektivbewaltigen AT pahitimea cybersituationalawarenessinpublicprivatepartnershipsorganisationsubergreifendecybersicherheitsvorfalleeffektivbewaltigen AT leitnermaria cybersituationalawarenessinpublicprivatepartnershipsorganisationsubergreifendecybersicherheitsvorfalleeffektivbewaltigen |