Cyber threat intelligence:
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2018]
|
Schriftenreihe: | Advances in information security
volume 70 |
Schlagworte: | |
Beschreibung: | VI, 334 Seiten Illustrationen, Diagramme (teilweise farbig) |
ISBN: | 9783030088910 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV046739758 | ||
003 | DE-604 | ||
005 | 20200922 | ||
007 | t | ||
008 | 200528s2018 a||| |||| 00||| eng d | ||
020 | |a 9783030088910 |9 978-3-030-08891-0 | ||
035 | |a (OCoLC)1037947039 | ||
035 | |a (DE-599)BVBBV046739758 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
245 | 1 | 0 | |a Cyber threat intelligence |c Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors |
264 | 1 | |a Cham |b Springer |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a VI, 334 Seiten |b Illustrationen, Diagramme (teilweise farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v volume 70 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computers | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Security | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Computer Communication Networks | |
700 | 1 | |a Dehghantanha, Ali |4 edt | |
700 | 1 | |a Conti, Mauro |4 edt | |
700 | 1 | |a Dargahi, Tooska |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-73951-9 |
830 | 0 | |a Advances in information security |v volume 70 |w (DE-604)BV014168308 |9 70 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032149693 |
Datensatz im Suchindex
_version_ | 1804181491280773120 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Dehghantanha, Ali Conti, Mauro Dargahi, Tooska |
author2_role | edt edt edt |
author2_variant | a d ad m c mc t d td |
author_facet | Dehghantanha, Ali Conti, Mauro Dargahi, Tooska |
building | Verbundindex |
bvnumber | BV046739758 |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)1037947039 (DE-599)BVBBV046739758 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01486nam a2200445 cb4500</leader><controlfield tag="001">BV046739758</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200922 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200528s2018 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030088910</subfield><subfield code="9">978-3-030-08891-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037947039</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046739758</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber threat intelligence</subfield><subfield code="c">Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VI, 334 Seiten</subfield><subfield code="b">Illustrationen, Diagramme (teilweise farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">volume 70</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dehghantanha, Ali</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Conti, Mauro</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dargahi, Tooska</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-73951-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">volume 70</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">70</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032149693</subfield></datafield></record></collection> |
id | DE-604.BV046739758 |
illustrated | Illustrated |
index_date | 2024-07-03T14:38:59Z |
indexdate | 2024-07-10T08:52:30Z |
institution | BVB |
isbn | 9783030088910 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032149693 |
oclc_num | 1037947039 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | VI, 334 Seiten Illustrationen, Diagramme (teilweise farbig) |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Cyber threat intelligence Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors Cham Springer [2018] © 2018 VI, 334 Seiten Illustrationen, Diagramme (teilweise farbig) txt rdacontent n rdamedia nc rdacarrier Advances in information security volume 70 Computer science Computer communication systems Computers Artificial intelligence Computer Science Security Artificial Intelligence (incl. Robotics) Information Systems and Communication Service Computer Communication Networks Dehghantanha, Ali edt Conti, Mauro edt Dargahi, Tooska edt Erscheint auch als Online-Ausgabe 978-3-319-73951-9 Advances in information security volume 70 (DE-604)BV014168308 70 |
spellingShingle | Cyber threat intelligence Advances in information security Computer science Computer communication systems Computers Artificial intelligence Computer Science Security Artificial Intelligence (incl. Robotics) Information Systems and Communication Service Computer Communication Networks |
title | Cyber threat intelligence |
title_auth | Cyber threat intelligence |
title_exact_search | Cyber threat intelligence |
title_exact_search_txtP | Cyber threat intelligence |
title_full | Cyber threat intelligence Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors |
title_fullStr | Cyber threat intelligence Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors |
title_full_unstemmed | Cyber threat intelligence Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors |
title_short | Cyber threat intelligence |
title_sort | cyber threat intelligence |
topic | Computer science Computer communication systems Computers Artificial intelligence Computer Science Security Artificial Intelligence (incl. Robotics) Information Systems and Communication Service Computer Communication Networks |
topic_facet | Computer science Computer communication systems Computers Artificial intelligence Computer Science Security Artificial Intelligence (incl. Robotics) Information Systems and Communication Service Computer Communication Networks |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT dehghantanhaali cyberthreatintelligence AT contimauro cyberthreatintelligence AT dargahitooska cyberthreatintelligence |