Comprehensive guide to 5G security:
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons
2018
|
Schlagworte: | |
Beschreibung: | Includes index |
Beschreibung: | XXXIX, 440 Seiten Illustrationen, Diagramme |
ISBN: | 9781119293040 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045297283 | ||
003 | DE-604 | ||
005 | 20190211 | ||
007 | t | ||
008 | 181119s2018 xxua||| |||| 00||| eng d | ||
010 | |a 017040682 | ||
020 | |a 9781119293040 |9 978-1-119-29304-0 | ||
035 | |a (OCoLC)1086278192 | ||
035 | |a (DE-599)BVBBV045297283 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-11 | ||
050 | 0 | |a TK5103.2 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ZN 6560 |0 (DE-625)157572: |2 rvk | ||
245 | 1 | 0 | |a Comprehensive guide to 5G security |c edited by Madhusanka Liyanage, University of Oulu, Finland, Ijaz Ahmad,University of Oulu, Finland, Ahmed Bux Abro, VMware Inc., USA, Andrei Gurtov, Linköping University, Sweden, Mika Ylianttila, University of Oulu, Finland |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons |c 2018 | |
300 | |a XXXIX, 440 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 4 | |a Mobile communication systems |x Security measures | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 0 | 7 | |a 5G |0 (DE-588)1188755676 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobilfunk |0 (DE-588)4170280-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Mobilfunk |0 (DE-588)4170280-3 |D s |
689 | 0 | 1 | |a 5G |0 (DE-588)1188755676 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Liyanage, Madhusanka |0 (DE-588)1079301984 |4 edt | |
700 | 1 | |a Ahmad, Ijaz |4 edt | |
700 | 1 | |a Abro, Ahmed Bux |4 edt | |
700 | 1 | |a Gurtov, Andrei |4 edt | |
700 | 1 | |a Ylianttila, Mika |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-119-29308-8 |
999 | |a oai:aleph.bib-bvb.de:BVB01-030684500 |
Datensatz im Suchindex
_version_ | 1804179079454261248 |
---|---|
any_adam_object | |
author2 | Liyanage, Madhusanka Ahmad, Ijaz Abro, Ahmed Bux Gurtov, Andrei Ylianttila, Mika |
author2_role | edt edt edt edt edt |
author2_variant | m l ml i a ia a b a ab aba a g ag m y my |
author_GND | (DE-588)1079301984 |
author_facet | Liyanage, Madhusanka Ahmad, Ijaz Abro, Ahmed Bux Gurtov, Andrei Ylianttila, Mika |
building | Verbundindex |
bvnumber | BV045297283 |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 |
callnumber-search | TK5103.2 |
callnumber-sort | TK 45103.2 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ZN 6560 |
ctrlnum | (OCoLC)1086278192 (DE-599)BVBBV045297283 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01882nam a2200505 c 4500</leader><controlfield tag="001">BV045297283</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190211 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">181119s2018 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017040682</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119293040</subfield><subfield code="9">978-1-119-29304-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1086278192</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045297283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5103.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6560</subfield><subfield code="0">(DE-625)157572:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Comprehensive guide to 5G security</subfield><subfield code="c">edited by Madhusanka Liyanage, University of Oulu, Finland, Ijaz Ahmad,University of Oulu, Finland, Ahmed Bux Abro, VMware Inc., USA, Andrei Gurtov, Linköping University, Sweden, Mika Ylianttila, University of Oulu, Finland</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIX, 440 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">5G</subfield><subfield code="0">(DE-588)1188755676</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobilfunk</subfield><subfield code="0">(DE-588)4170280-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">5G</subfield><subfield code="0">(DE-588)1188755676</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liyanage, Madhusanka</subfield><subfield code="0">(DE-588)1079301984</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmad, Ijaz</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abro, Ahmed Bux</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gurtov, Andrei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ylianttila, Mika</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-119-29308-8</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030684500</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045297283 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:14:10Z |
institution | BVB |
isbn | 9781119293040 |
language | English |
lccn | 017040682 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030684500 |
oclc_num | 1086278192 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | XXXIX, 440 Seiten Illustrationen, Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Comprehensive guide to 5G security edited by Madhusanka Liyanage, University of Oulu, Finland, Ijaz Ahmad,University of Oulu, Finland, Ahmed Bux Abro, VMware Inc., USA, Andrei Gurtov, Linköping University, Sweden, Mika Ylianttila, University of Oulu, Finland Hoboken, NJ John Wiley & Sons 2018 XXXIX, 440 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Includes index Mobile communication systems Security measures Wireless communication systems Security measures 5G (DE-588)1188755676 gnd rswk-swf Mobilfunk (DE-588)4170280-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Mobilfunk (DE-588)4170280-3 s 5G (DE-588)1188755676 s Sicherheit (DE-588)4054790-5 s DE-604 Liyanage, Madhusanka (DE-588)1079301984 edt Ahmad, Ijaz edt Abro, Ahmed Bux edt Gurtov, Andrei edt Ylianttila, Mika edt Erscheint auch als Online-Ausgabe 978-1-119-29308-8 |
spellingShingle | Comprehensive guide to 5G security Mobile communication systems Security measures Wireless communication systems Security measures 5G (DE-588)1188755676 gnd Mobilfunk (DE-588)4170280-3 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)1188755676 (DE-588)4170280-3 (DE-588)4054790-5 (DE-588)4143413-4 |
title | Comprehensive guide to 5G security |
title_auth | Comprehensive guide to 5G security |
title_exact_search | Comprehensive guide to 5G security |
title_full | Comprehensive guide to 5G security edited by Madhusanka Liyanage, University of Oulu, Finland, Ijaz Ahmad,University of Oulu, Finland, Ahmed Bux Abro, VMware Inc., USA, Andrei Gurtov, Linköping University, Sweden, Mika Ylianttila, University of Oulu, Finland |
title_fullStr | Comprehensive guide to 5G security edited by Madhusanka Liyanage, University of Oulu, Finland, Ijaz Ahmad,University of Oulu, Finland, Ahmed Bux Abro, VMware Inc., USA, Andrei Gurtov, Linköping University, Sweden, Mika Ylianttila, University of Oulu, Finland |
title_full_unstemmed | Comprehensive guide to 5G security edited by Madhusanka Liyanage, University of Oulu, Finland, Ijaz Ahmad,University of Oulu, Finland, Ahmed Bux Abro, VMware Inc., USA, Andrei Gurtov, Linköping University, Sweden, Mika Ylianttila, University of Oulu, Finland |
title_short | Comprehensive guide to 5G security |
title_sort | comprehensive guide to 5g security |
topic | Mobile communication systems Security measures Wireless communication systems Security measures 5G (DE-588)1188755676 gnd Mobilfunk (DE-588)4170280-3 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Mobile communication systems Security measures Wireless communication systems Security measures 5G Mobilfunk Sicherheit Aufsatzsammlung |
work_keys_str_mv | AT liyanagemadhusanka comprehensiveguideto5gsecurity AT ahmadijaz comprehensiveguideto5gsecurity AT abroahmedbux comprehensiveguideto5gsecurity AT gurtovandrei comprehensiveguideto5gsecurity AT ylianttilamika comprehensiveguideto5gsecurity |