Handbook of Security Science:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2019-
Cham Springer |
Ausgabe: | Living reference work, continuously updated edition |
Schlagworte: | |
Online-Zugang: | BFB01 TUM01 UBM01 UBT01 URL des Erstveröffentlichers |
ISBN: | 9783319517612 |
DOI: | 10.1007/978-3-319-51761-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046062779 | ||
003 | DE-604 | ||
005 | 20211029 | ||
007 | cr|uuu---uuuuu | ||
008 | 190724s2019 |||| o||u| ||||||eng d | ||
020 | |a 9783319517612 |c Online |9 978-3-319-51761-2 | ||
024 | 7 | |a 10.1007/978-3-319-51761-2 |2 doi | |
035 | |a (ZDB-2-PHA)9783319517612 | ||
035 | |a (OCoLC)1111842120 | ||
035 | |a (DE-599)BVBBV046062779 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-703 |a DE-634 |a DE-522 | ||
082 | 0 | |a 621.389 |2 23 | |
084 | |a PHY 000 |2 stub | ||
245 | 1 | 0 | |a Handbook of Security Science |c edited by Anthony J. Masys |
250 | |a Living reference work, continuously updated edition | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2019- | |
264 | 1 | |a Cham |b Springer | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Military and Defence Studies | |
650 | 4 | |a Sustainable Development | |
650 | 4 | |a International Security Studies | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Politics and war | |
650 | 4 | |a Sustainable development | |
650 | 4 | |a Security, International | |
650 | 0 | 7 | |a Sicherheitstechnik |0 (DE-588)4077423-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 2 | |a Sicherheitstechnik |0 (DE-588)4077423-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Masys, Anthony J. |4 edt | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-51761-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-PHA |a ZDB-2-SLR | ||
940 | 1 | |q ZDB-2-PHA_2020_Fremddaten | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031444094 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-51761-2 |l BFB01 |p ZDB-2-PHA |q TUM_LRW |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-51761-2 |l TUM01 |p ZDB-2-PHA |q TUM_LRW |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-51761-2 |l UBM01 |p ZDB-2-PHA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-51761-2 |l UBT01 |p ZDB-2-PHA |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180340766408704 |
---|---|
any_adam_object | |
author2 | Masys, Anthony J. |
author2_role | edt |
author2_variant | a j m aj ajm |
author_facet | Masys, Anthony J. |
building | Verbundindex |
bvnumber | BV046062779 |
classification_tum | PHY 000 |
collection | ZDB-2-PHA ZDB-2-SLR |
ctrlnum | (ZDB-2-PHA)9783319517612 (OCoLC)1111842120 (DE-599)BVBBV046062779 |
dewey-full | 621.389 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.389 |
dewey-search | 621.389 |
dewey-sort | 3621.389 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Physik Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-319-51761-2 |
edition | Living reference work, continuously updated edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02355nmm a2200613zc 4500</leader><controlfield tag="001">BV046062779</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211029 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190724s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319517612</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-51761-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-51761-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-PHA)9783319517612</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111842120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046062779</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.389</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PHY 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook of Security Science</subfield><subfield code="c">edited by Anthony J. Masys</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Living reference work, continuously updated edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2019-</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military and Defence Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sustainable Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Security Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politics and war</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sustainable development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitstechnik</subfield><subfield code="0">(DE-588)4077423-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitstechnik</subfield><subfield code="0">(DE-588)4077423-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Masys, Anthony J.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-51761-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-PHA</subfield><subfield code="a">ZDB-2-SLR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-PHA_2020_Fremddaten</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031444094</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-51761-2</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="q">TUM_LRW</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-51761-2</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="q">TUM_LRW</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-51761-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-51761-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046062779 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:34:13Z |
institution | BVB |
isbn | 9783319517612 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031444094 |
oclc_num | 1111842120 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-703 DE-634 DE-522 |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-703 DE-634 DE-522 |
psigel | ZDB-2-PHA ZDB-2-SLR ZDB-2-PHA_2020_Fremddaten ZDB-2-PHA TUM_LRW |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer International Publishing Springer |
record_format | marc |
spelling | Handbook of Security Science edited by Anthony J. Masys Living reference work, continuously updated edition Cham Springer International Publishing 2019- Cham Springer txt rdacontent c rdamedia cr rdacarrier Security Science and Technology Terrorism Cybercrime Military and Defence Studies Sustainable Development International Security Studies Computer crimes Politics and war Sustainable development Security, International Sicherheitstechnik (DE-588)4077423-5 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s Terrorismus (DE-588)4059534-1 s Sicherheitstechnik (DE-588)4077423-5 s DE-604 Masys, Anthony J. edt https://doi.org/10.1007/978-3-319-51761-2 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Handbook of Security Science Security Science and Technology Terrorism Cybercrime Military and Defence Studies Sustainable Development International Security Studies Computer crimes Politics and war Sustainable development Security, International Sicherheitstechnik (DE-588)4077423-5 gnd Computerkriminalität (DE-588)4010452-7 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4077423-5 (DE-588)4010452-7 (DE-588)4059534-1 |
title | Handbook of Security Science |
title_auth | Handbook of Security Science |
title_exact_search | Handbook of Security Science |
title_full | Handbook of Security Science edited by Anthony J. Masys |
title_fullStr | Handbook of Security Science edited by Anthony J. Masys |
title_full_unstemmed | Handbook of Security Science edited by Anthony J. Masys |
title_short | Handbook of Security Science |
title_sort | handbook of security science |
topic | Security Science and Technology Terrorism Cybercrime Military and Defence Studies Sustainable Development International Security Studies Computer crimes Politics and war Sustainable development Security, International Sicherheitstechnik (DE-588)4077423-5 gnd Computerkriminalität (DE-588)4010452-7 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Security Science and Technology Terrorism Cybercrime Military and Defence Studies Sustainable Development International Security Studies Computer crimes Politics and war Sustainable development Security, International Sicherheitstechnik Computerkriminalität Terrorismus |
url | https://doi.org/10.1007/978-3-319-51761-2 |
work_keys_str_mv | AT masysanthonyj handbookofsecurityscience |