The five technological forces disrupting security: how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Elsevier/ Butterworth-Heinemann, an imprint of Elsevier
[2018]
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xix, 224 pages 24 cm |
ISBN: | 9780128050958 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045440624 | ||
003 | DE-604 | ||
005 | 20190225 | ||
007 | t | ||
008 | 190205s2018 xxu |||| 00||| eng d | ||
010 | |a 017942446 | ||
020 | |a 9780128050958 |9 978-0-12-805095-8 | ||
035 | |a (OCoLC)1019797798 | ||
035 | |a (DE-599)BVBBV045440624 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-703 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
100 | 1 | |a Van Till, Steve |e Verfasser |0 (DE-588)1150733659 |4 aut | |
245 | 1 | 0 | |a The five technological forces disrupting security |b how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age |c Steve Van Till, Bethesda, MD, United States |
264 | 1 | |a Oxford |b Elsevier/ Butterworth-Heinemann, an imprint of Elsevier |c [2018] | |
300 | |a xix, 224 pages |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Social media |x Security measures | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Mobile communication systems |x Security measures | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030826141 |
Datensatz im Suchindex
_version_ | 1804179335558463488 |
---|---|
any_adam_object | |
author | Van Till, Steve |
author_GND | (DE-588)1150733659 |
author_facet | Van Till, Steve |
author_role | aut |
author_sort | Van Till, Steve |
author_variant | t s v ts tsv |
building | Verbundindex |
bvnumber | BV045440624 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | SR 850 |
ctrlnum | (OCoLC)1019797798 (DE-599)BVBBV045440624 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01340nam a2200373 c 4500</leader><controlfield tag="001">BV045440624</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190225 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190205s2018 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017942446</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128050958</subfield><subfield code="9">978-0-12-805095-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1019797798</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045440624</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Van Till, Steve</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1150733659</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The five technological forces disrupting security</subfield><subfield code="b">how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age</subfield><subfield code="c">Steve Van Till, Bethesda, MD, United States</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Elsevier/ Butterworth-Heinemann, an imprint of Elsevier</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 224 pages</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social media</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030826141</subfield></datafield></record></collection> |
id | DE-604.BV045440624 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:18:14Z |
institution | BVB |
isbn | 9780128050958 |
language | English |
lccn | 017942446 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030826141 |
oclc_num | 1019797798 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | xix, 224 pages 24 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Elsevier/ Butterworth-Heinemann, an imprint of Elsevier |
record_format | marc |
spelling | Van Till, Steve Verfasser (DE-588)1150733659 aut The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age Steve Van Till, Bethesda, MD, United States Oxford Elsevier/ Butterworth-Heinemann, an imprint of Elsevier [2018] xix, 224 pages 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computer networks Security measures Social media Security measures Cloud computing Security measures Mobile communication systems Security measures |
spellingShingle | Van Till, Steve The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age Computer networks Security measures Social media Security measures Cloud computing Security measures Mobile communication systems Security measures |
title | The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age |
title_auth | The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age |
title_exact_search | The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age |
title_full | The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age Steve Van Till, Bethesda, MD, United States |
title_fullStr | The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age Steve Van Till, Bethesda, MD, United States |
title_full_unstemmed | The five technological forces disrupting security how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age Steve Van Till, Bethesda, MD, United States |
title_short | The five technological forces disrupting security |
title_sort | the five technological forces disrupting security how cloud social mobile big data and iot are transforming physical security in the digital age |
title_sub | how Cloud, Social, Mobile, Big Data and IoT are transforming physical security in the digital age |
topic | Computer networks Security measures Social media Security measures Cloud computing Security measures Mobile communication systems Security measures |
topic_facet | Computer networks Security measures Social media Security measures Cloud computing Security measures Mobile communication systems Security measures |
work_keys_str_mv | AT vantillsteve thefivetechnologicalforcesdisruptingsecurityhowcloudsocialmobilebigdataandiotaretransformingphysicalsecurityinthedigitalage |