Handbook of security and networks:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hackensack, NJ
World Scientific
2011
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xxi, 551 pages) illustrations |
ISBN: | 9789814273046 981427304X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349347 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 |||| o||u| ||||||eng d | ||
020 | |a 9789814273046 |9 978-981-4273-04-6 | ||
020 | |a 981427304X |9 981-4273-04-X | ||
035 | |a (ZDB-4-ITC)ocn755587690 | ||
035 | |a (OCoLC)755587690 | ||
035 | |a (DE-599)BVBBV045349347 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Handbook of security and networks |c editors, Yang Xiao, Frank H Li, Hui Chen |
264 | 1 | |a Hackensack, NJ |b World Scientific |c 2011 | |
300 | |a 1 online resource (xxi, 551 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Rechnernetz |2 gnd | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Xiao, Yang |d 1966- |e Sonstige |4 oth | |
700 | 1 | |a Li, Frank Haizhon |e Sonstige |4 oth | |
700 | 1 | |a Chen, Hui |d 1972- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Handbook of security and networks |d Hackensack, NJ : World Scientific, 2011 |z 9789814273039 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735998 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179173191712768 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045349347 |
classification_rvk | ST 276 |
collection | ZDB-4-ITC |
contents | This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic |
ctrlnum | (ZDB-4-ITC)ocn755587690 (OCoLC)755587690 (DE-599)BVBBV045349347 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02812nmm a2200541zc 4500</leader><controlfield tag="001">BV045349347</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814273046</subfield><subfield code="9">978-981-4273-04-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981427304X</subfield><subfield code="9">981-4273-04-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn755587690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)755587690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349347</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of security and networks</subfield><subfield code="c">editors, Yang Xiao, Frank H Li, Hui Chen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hackensack, NJ</subfield><subfield code="b">World Scientific</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 551 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiao, Yang</subfield><subfield code="d">1966-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Frank Haizhon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Hui</subfield><subfield code="d">1972-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Handbook of security and networks</subfield><subfield code="d">Hackensack, NJ : World Scientific, 2011</subfield><subfield code="z">9789814273039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735998</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045349347 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9789814273046 981427304X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735998 |
oclc_num | 755587690 |
open_access_boolean | |
physical | 1 online resource (xxi, 551 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | World Scientific |
record_format | marc |
spelling | Handbook of security and networks editors, Yang Xiao, Frank H Li, Hui Chen Hackensack, NJ World Scientific 2011 1 online resource (xxi, 551 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Print version record This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computersicherheit gnd Rechnernetz gnd Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Xiao, Yang 1966- Sonstige oth Li, Frank Haizhon Sonstige oth Chen, Hui 1972- Sonstige oth Erscheint auch als Druck-Ausgabe Handbook of security and networks Hackensack, NJ : World Scientific, 2011 9789814273039 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Handbook of security and networks This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computersicherheit gnd Rechnernetz gnd Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Handbook of security and networks |
title_auth | Handbook of security and networks |
title_exact_search | Handbook of security and networks |
title_full | Handbook of security and networks editors, Yang Xiao, Frank H Li, Hui Chen |
title_fullStr | Handbook of security and networks editors, Yang Xiao, Frank H Li, Hui Chen |
title_full_unstemmed | Handbook of security and networks editors, Yang Xiao, Frank H Li, Hui Chen |
title_short | Handbook of security and networks |
title_sort | handbook of security and networks |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computersicherheit gnd Rechnernetz gnd Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computersicherheit Rechnernetz Computer networks Security measures Aufsatzsammlung |
work_keys_str_mv | AT xiaoyang handbookofsecurityandnetworks AT lifrankhaizhon handbookofsecurityandnetworks AT chenhui handbookofsecurityandnetworks |