Cyberdanger: understanding and guarding against cybercrime
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2019]
|
Schlagworte: | |
Beschreibung: | xxii, 218 Seiten Illustrationen, Porträts, Karte (teilweise farbig) |
ISBN: | 9783030045302 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046764255 | ||
003 | DE-604 | ||
005 | 20210728 | ||
007 | t | ||
008 | 200615s2019 ac|| |||| 00||| eng d | ||
020 | |a 9783030045302 |9 978-3-030-04530-2 | ||
035 | |a (OCoLC)1158499941 | ||
035 | |a (DE-599)BVBBV046764255 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 055f |2 stub | ||
100 | 1 | |a Willems, Eddy |d 1962- |e Verfasser |0 (DE-588)1103575414 |4 aut | |
245 | 1 | 0 | |a Cyberdanger |b understanding and guarding against cybercrime |c Eddy Willems |
264 | 1 | |a Cham |b Springer |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xxii, 218 Seiten |b Illustrationen, Porträts, Karte (teilweise farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Crime Control and Security | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Security Services | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Computer security | |
650 | 4 | |a Public safety | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 2 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-04531-9 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032173765 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804181533137829888 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Willems, Eddy 1962- |
author_GND | (DE-588)1103575414 |
author_facet | Willems, Eddy 1962- |
author_role | aut |
author_sort | Willems, Eddy 1962- |
author_variant | e w ew |
building | Verbundindex |
bvnumber | BV046764255 |
classification_rvk | ST 277 |
classification_tum | DAT 055f |
ctrlnum | (OCoLC)1158499941 (DE-599)BVBBV046764255 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02091nam a2200577 c 4500</leader><controlfield tag="001">BV046764255</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210728 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200615s2019 ac|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030045302</subfield><subfield code="9">978-3-030-04530-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1158499941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046764255</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Willems, Eddy</subfield><subfield code="d">1962-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1103575414</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberdanger</subfield><subfield code="b">understanding and guarding against cybercrime</subfield><subfield code="c">Eddy Willems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 218 Seiten</subfield><subfield code="b">Illustrationen, Porträts, Karte (teilweise farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime Control and Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-04531-9</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032173765</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV046764255 |
illustrated | Illustrated |
index_date | 2024-07-03T14:44:56Z |
indexdate | 2024-07-10T08:53:10Z |
institution | BVB |
isbn | 9783030045302 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032173765 |
oclc_num | 1158499941 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xxii, 218 Seiten Illustrationen, Porträts, Karte (teilweise farbig) |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
spelling | Willems, Eddy 1962- Verfasser (DE-588)1103575414 aut Cyberdanger understanding and guarding against cybercrime Eddy Willems Cham Springer [2019] © 2019 xxii, 218 Seiten Illustrationen, Porträts, Karte (teilweise farbig) txt rdacontent n rdamedia nc rdacarrier Systems and Data Security Crime Control and Security Computer Crime Security Science and Technology Security Services Mobile and Network Security Computer security Public safety Computer crimes Computer networks / Security measures Cyberattacke (DE-588)1075612675 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Malware (DE-588)4687059-3 s Cyberattacke (DE-588)1075612675 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Erscheint auch als Online-Ausgabe 978-3-030-04531-9 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Willems, Eddy 1962- Cyberdanger understanding and guarding against cybercrime Systems and Data Security Crime Control and Security Computer Crime Security Science and Technology Security Services Mobile and Network Security Computer security Public safety Computer crimes Computer networks / Security measures Cyberattacke (DE-588)1075612675 gnd Datensicherung (DE-588)4011144-1 gnd Malware (DE-588)4687059-3 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1075612675 (DE-588)4011144-1 (DE-588)4687059-3 (DE-588)7864395-8 (DE-588)4274324-2 |
title | Cyberdanger understanding and guarding against cybercrime |
title_auth | Cyberdanger understanding and guarding against cybercrime |
title_exact_search | Cyberdanger understanding and guarding against cybercrime |
title_exact_search_txtP | Cyberdanger understanding and guarding against cybercrime |
title_full | Cyberdanger understanding and guarding against cybercrime Eddy Willems |
title_fullStr | Cyberdanger understanding and guarding against cybercrime Eddy Willems |
title_full_unstemmed | Cyberdanger understanding and guarding against cybercrime Eddy Willems |
title_short | Cyberdanger |
title_sort | cyberdanger understanding and guarding against cybercrime |
title_sub | understanding and guarding against cybercrime |
topic | Systems and Data Security Crime Control and Security Computer Crime Security Science and Technology Security Services Mobile and Network Security Computer security Public safety Computer crimes Computer networks / Security measures Cyberattacke (DE-588)1075612675 gnd Datensicherung (DE-588)4011144-1 gnd Malware (DE-588)4687059-3 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Systems and Data Security Crime Control and Security Computer Crime Security Science and Technology Security Services Mobile and Network Security Computer security Public safety Computer crimes Computer networks / Security measures Cyberattacke Datensicherung Malware Internetkriminalität Computersicherheit |
work_keys_str_mv | AT willemseddy cyberdangerunderstandingandguardingagainstcybercrime |