Federal information security: select protection & control efforts
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hauppauge, N.Y.
Nova Science
2012
|
Schriftenreihe: | Defense, security and strategy series
Safety and risk in society series |
Schlagworte: | |
Beschreibung: | 1 online resource |
ISBN: | 9781619428164 1619428164 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045351569 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781619428164 |9 978-1-61942-816-4 | ||
020 | |a 1619428164 |9 1-61942-816-4 | ||
035 | |a (ZDB-4-ITC)ocn939756367 | ||
035 | |a (OCoLC)939756367 | ||
035 | |a (DE-599)BVBBV045351569 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.80973 |2 23 | |
245 | 1 | 0 | |a Federal information security |b select protection & control efforts |c David G. Miller and Ivan I. Wilson, editors |
264 | 1 | |a Hauppauge, N.Y. |b Nova Science |c 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Defense, security and strategy series | |
490 | 0 | |a Safety and risk in society series | |
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Transmission Systems / Wireless |2 bisacsh | |
650 | 7 | |a Computer security / Government policy |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information networks / Security measures |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 4 | |a Wireless communication systems |x Security measures |z United States |a Computer security |x Government policy |z United States |a Information networks |x Security measures |z United States |a Data protection |z United States | |
700 | 1 | |a Miller, David G. |e Sonstige |4 oth | |
700 | 1 | |a Wilson, Ivan I. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781619427716 |z 1619427710 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030738223 |
Datensatz im Suchindex
_version_ | 1804179177157427200 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045351569 |
collection | ZDB-4-ITC |
ctrlnum | (ZDB-4-ITC)ocn939756367 (OCoLC)939756367 (DE-599)BVBBV045351569 |
dewey-full | 005.80973 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.80973 |
dewey-search | 005.80973 |
dewey-sort | 15.80973 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01712nmm a2200421zc 4500</leader><controlfield tag="001">BV045351569</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781619428164</subfield><subfield code="9">978-1-61942-816-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1619428164</subfield><subfield code="9">1-61942-816-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn939756367</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)939756367</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045351569</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.80973</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Federal information security</subfield><subfield code="b">select protection & control efforts</subfield><subfield code="c">David G. Miller and Ivan I. Wilson, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hauppauge, N.Y.</subfield><subfield code="b">Nova Science</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Defense, security and strategy series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Safety and risk in society series</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Transmission Systems / Wireless</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="a">Computer security</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield><subfield code="a">Information networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield><subfield code="a">Data protection</subfield><subfield code="z">United States</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, David G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilson, Ivan I.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781619427716</subfield><subfield code="z">1619427710</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030738223</subfield></datafield></record></collection> |
id | DE-604.BV045351569 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:43Z |
institution | BVB |
isbn | 9781619428164 1619428164 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030738223 |
oclc_num | 939756367 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Nova Science |
record_format | marc |
series2 | Defense, security and strategy series Safety and risk in society series |
spelling | Federal information security select protection & control efforts David G. Miller and Ivan I. Wilson, editors Hauppauge, N.Y. Nova Science 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier Defense, security and strategy series Safety and risk in society series COMPUTERS / Security / Networking bisacsh COMPUTERS / Data Transmission Systems / Wireless bisacsh Computer security / Government policy fast Data protection fast Information networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures United States Computer security Government policy United States Information networks Security measures United States Data protection United States Miller, David G. Sonstige oth Wilson, Ivan I. Sonstige oth Erscheint auch als Druck-Ausgabe 9781619427716 1619427710 |
spellingShingle | Federal information security select protection & control efforts COMPUTERS / Security / Networking bisacsh COMPUTERS / Data Transmission Systems / Wireless bisacsh Computer security / Government policy fast Data protection fast Information networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures United States Computer security Government policy United States Information networks Security measures United States Data protection United States |
title | Federal information security select protection & control efforts |
title_auth | Federal information security select protection & control efforts |
title_exact_search | Federal information security select protection & control efforts |
title_full | Federal information security select protection & control efforts David G. Miller and Ivan I. Wilson, editors |
title_fullStr | Federal information security select protection & control efforts David G. Miller and Ivan I. Wilson, editors |
title_full_unstemmed | Federal information security select protection & control efforts David G. Miller and Ivan I. Wilson, editors |
title_short | Federal information security |
title_sort | federal information security select protection control efforts |
title_sub | select protection & control efforts |
topic | COMPUTERS / Security / Networking bisacsh COMPUTERS / Data Transmission Systems / Wireless bisacsh Computer security / Government policy fast Data protection fast Information networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures United States Computer security Government policy United States Information networks Security measures United States Data protection United States |
topic_facet | COMPUTERS / Security / Networking COMPUTERS / Data Transmission Systems / Wireless Computer security / Government policy Data protection Information networks / Security measures Wireless communication systems / Security measures Wireless communication systems Security measures United States Computer security Government policy United States Information networks Security measures United States Data protection United States |
work_keys_str_mv | AT millerdavidg federalinformationsecurityselectprotectioncontrolefforts AT wilsonivani federalinformationsecurityselectprotectioncontrolefforts |