The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2023
Cham Springer |
Ausgabe: | 2nd ed. 2023 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FCO01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBY01 UER01 Volltext |
Beschreibung: | 1 Online-Ressource (XXII, 396 p. 1 illus) |
ISBN: | 9783031216510 |
DOI: | 10.1007/978-3-031-21651-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048919076 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230502s2023 |||| o||u| ||||||eng d | ||
020 | |a 9783031216510 |c Online |9 978-3-031-21651-0 | ||
024 | 7 | |a 10.1007/978-3-031-21651-0 |2 doi | |
035 | |a (ZDB-2-ENG)9783031216510 | ||
035 | |a (OCoLC)1378501219 | ||
035 | |a (DE-599)BVBBV048919076 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-860 |a DE-91 |a DE-858 |a DE-1046 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-29 |a DE-863 |a DE-1050 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-706 |a DE-634 | ||
082 | 0 | |a 621.382 |2 23 | |
084 | |a ELT 000 |2 stub | ||
084 | |a MAS 000 |2 stub | ||
100 | 1 | |a Alsmadi, Izzat |e Verfasser |4 aut | |
245 | 1 | 0 | |a The NICE Cyber Security Framework |b Cyber Security Intelligence and Analytics |c by Izzat Alsmadi |
250 | |a 2nd ed. 2023 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2023 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XXII, 396 p. 1 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Data protection | |
650 | 4 | |a Security systems | |
650 | 4 | |a Computer networks | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-21650-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-21652-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-21653-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-21651-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2023 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034183167 | ||
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FCO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FHD01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FHM01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FLA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l HTW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l TUM01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-21651-0 |l UER01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1039290 |
---|---|
_version_ | 1824553690117177345 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Alsmadi, Izzat |
author_facet | Alsmadi, Izzat |
author_role | aut |
author_sort | Alsmadi, Izzat |
author_variant | i a ia |
building | Verbundindex |
bvnumber | BV048919076 |
classification_tum | ELT 000 MAS 000 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)9783031216510 (OCoLC)1378501219 (DE-599)BVBBV048919076 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik Elektrotechnik / Elektronik / Nachrichtentechnik Maschinenbau |
discipline_str_mv | Elektrotechnik Elektrotechnik / Elektronik / Nachrichtentechnik Maschinenbau |
doi_str_mv | 10.1007/978-3-031-21651-0 |
edition | 2nd ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03679nmm a2200733zc 4500</leader><controlfield tag="001">BV048919076</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230502s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031216510</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-21651-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-21651-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)9783031216510</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1378501219</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048919076</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAS 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alsmadi, Izzat</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The NICE Cyber Security Framework</subfield><subfield code="b">Cyber Security Intelligence and Analytics</subfield><subfield code="c">by Izzat Alsmadi</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 396 p. 1 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-21650-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-21652-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-21653-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2023</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034183167</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-21651-0</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048919076 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:55:12Z |
indexdate | 2025-02-20T06:39:53Z |
institution | BVB |
isbn | 9783031216510 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034183167 |
oclc_num | 1378501219 |
open_access_boolean | |
owner | DE-1043 DE-860 DE-91 DE-BY-TUM DE-858 DE-1046 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-29 DE-863 DE-BY-FWS DE-1050 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-706 DE-634 |
owner_facet | DE-1043 DE-860 DE-91 DE-BY-TUM DE-858 DE-1046 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-29 DE-863 DE-BY-FWS DE-1050 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-706 DE-634 |
physical | 1 Online-Ressource (XXII, 396 p. 1 illus) |
psigel | ZDB-2-ENG ZDB-2-ENG_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer International Publishing Springer |
record_format | marc |
spellingShingle | Alsmadi, Izzat The NICE Cyber Security Framework Cyber Security Intelligence and Analytics Communications Engineering, Networks Data and Information Security Security Science and Technology Computer Communication Networks Telecommunication Data protection Security systems Computer networks |
title | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics |
title_auth | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics |
title_exact_search | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics |
title_exact_search_txtP | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics |
title_full | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics by Izzat Alsmadi |
title_fullStr | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics by Izzat Alsmadi |
title_full_unstemmed | The NICE Cyber Security Framework Cyber Security Intelligence and Analytics by Izzat Alsmadi |
title_short | The NICE Cyber Security Framework |
title_sort | the nice cyber security framework cyber security intelligence and analytics |
title_sub | Cyber Security Intelligence and Analytics |
topic | Communications Engineering, Networks Data and Information Security Security Science and Technology Computer Communication Networks Telecommunication Data protection Security systems Computer networks |
topic_facet | Communications Engineering, Networks Data and Information Security Security Science and Technology Computer Communication Networks Telecommunication Data protection Security systems Computer networks |
url | https://doi.org/10.1007/978-3-031-21651-0 |
work_keys_str_mv | AT alsmadiizzat thenicecybersecurityframeworkcybersecurityintelligenceandanalytics |