Research anthology on advancements in cybersecurity education:
"This research reference book of contributed chapters discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[2022]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This research reference book of contributed chapters discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data |
Beschreibung: | Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 11/30/2021) |
Beschreibung: | 1 Online-Ressource (578 Seiten) |
ISBN: | 9781668435557 1668435551 9781668435540 |
DOI: | 10.4018/978-1-6684-3554-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048263238 | ||
003 | DE-604 | ||
005 | 20220801 | ||
007 | cr|uuu---uuuuu | ||
008 | 220609s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781668435557 |9 978-1-66843-555-7 | ||
020 | |a 1668435551 |9 1-66843-555-1 | ||
020 | |a 9781668435540 |9 978-1-66843-554-0 | ||
024 | 7 | |a 10.4018/978-1-6684-3554-0 |2 doi | |
035 | |a (ZDB-98-IGB)072464488 | ||
035 | |a (OCoLC)1337140877 | ||
035 | |a (DE-599)BVBBV048263238 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Research anthology on advancements in cybersecurity education |c Information Resources Management Association, editor |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [2022] | |
264 | 4 | |c [2022] | |
300 | |a 1 Online-Ressource (578 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 11/30/2021) | ||
520 | |a "This research reference book of contributed chapters discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data | ||
650 | 4 | |a Computer security |x Study and teaching | |
650 | 4 | |a Computer networks |x Security measures |x Study and teaching | |
700 | 1 | |a Association, Information Resources Management |4 edt | |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-3554-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-3554-0 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079040752615424 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Association, Information Resources Management |
author2_role | edt |
author2_variant | i r m a irm irma |
author_facet | Association, Information Resources Management |
building | Verbundindex |
bvnumber | BV048263238 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)072464488 (OCoLC)1337140877 (DE-599)BVBBV048263238 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-6684-3554-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV048263238</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220801</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220609s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668435557</subfield><subfield code="9">978-1-66843-555-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1668435551</subfield><subfield code="9">1-66843-555-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668435540</subfield><subfield code="9">978-1-66843-554-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-3554-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)072464488</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1337140877</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048263238</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research anthology on advancements in cybersecurity education</subfield><subfield code="c">Information Resources Management Association, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (578 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 11/30/2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This research reference book of contributed chapters discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Study and teaching</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Study and teaching</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Association, Information Resources Management</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-3554-0</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048263238 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:59:43Z |
indexdate | 2024-07-20T06:38:40Z |
institution | BVB |
isbn | 9781668435557 1668435551 9781668435540 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033643436 |
oclc_num | 1337140877 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (578 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHR_PDA_IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global |
record_format | marc |
spelling | Research anthology on advancements in cybersecurity education Information Resources Management Association, editor Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [2022] [2022] 1 Online-Ressource (578 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 11/30/2021) "This research reference book of contributed chapters discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data Computer security Study and teaching Computer networks Security measures Study and teaching Association, Information Resources Management edt https://doi.org/10.4018/978-1-6684-3554-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Research anthology on advancements in cybersecurity education Computer security Study and teaching Computer networks Security measures Study and teaching |
title | Research anthology on advancements in cybersecurity education |
title_auth | Research anthology on advancements in cybersecurity education |
title_exact_search | Research anthology on advancements in cybersecurity education |
title_exact_search_txtP | Research anthology on advancements in cybersecurity education |
title_full | Research anthology on advancements in cybersecurity education Information Resources Management Association, editor |
title_fullStr | Research anthology on advancements in cybersecurity education Information Resources Management Association, editor |
title_full_unstemmed | Research anthology on advancements in cybersecurity education Information Resources Management Association, editor |
title_short | Research anthology on advancements in cybersecurity education |
title_sort | research anthology on advancements in cybersecurity education |
topic | Computer security Study and teaching Computer networks Security measures Study and teaching |
topic_facet | Computer security Study and teaching Computer networks Security measures Study and teaching |
url | https://doi.org/10.4018/978-1-6684-3554-0 |
work_keys_str_mv | AT associationinformationresourcesmanagement researchanthologyonadvancementsincybersecurityeducation |