Guide to data privacy: Models, technologies, solutions
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2022]
|
Schriftenreihe: | Undergraduate topics in computer science
|
Schlagworte: | |
Beschreibung: | xvi, 313 Seiten Illustrationen, Diagramme (teilweise farbig) |
ISBN: | 9783031128363 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049588438 | ||
003 | DE-604 | ||
005 | 20240527 | ||
007 | t | ||
008 | 240227s2022 a||| |||| 00||| eng d | ||
020 | |a 9783031128363 |9 978-3-031-12836-3 | ||
035 | |a (OCoLC)1350767092 | ||
035 | |a (DE-599)BVBBV049588438 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 323.448 |2 23 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Torra, Vicenç |e Verfasser |0 (DE-588)1127080679 |4 aut | |
245 | 1 | 0 | |a Guide to data privacy |b Models, technologies, solutions |c Vicenç Torra |
264 | 1 | |a Cham |b Springer |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a xvi, 313 Seiten |b Illustrationen, Diagramme (teilweise farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Undergraduate topics in computer science | |
650 | 4 | |a Privacy | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Information Ethics | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Data protection—Law and legislation | |
650 | 4 | |a Data protection | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Information technology—Moral and ethical aspects | |
650 | 4 | |a Computers and civilization | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-12837-0 |
Datensatz im Suchindex
_version_ | 1805081940309573632 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Torra, Vicenç |
author_GND | (DE-588)1127080679 |
author_facet | Torra, Vicenç |
author_role | aut |
author_sort | Torra, Vicenç |
author_variant | v t vt |
building | Verbundindex |
bvnumber | BV049588438 |
classification_rvk | ST 276 |
classification_tum | DAT 000 |
ctrlnum | (OCoLC)1350767092 (DE-599)BVBBV049588438 |
dewey-full | 323.448 005.8 |
dewey-hundreds | 300 - Social sciences 000 - Computer science, information, general works |
dewey-ones | 323 - Civil and political rights 005 - Computer programming, programs, data, security |
dewey-raw | 323.448 005.8 |
dewey-search | 323.448 005.8 |
dewey-sort | 3323.448 |
dewey-tens | 320 - Political science (Politics and government) 000 - Computer science, information, general works |
discipline | Informatik Politologie |
discipline_str_mv | Informatik Politologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049588438</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240527</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240227s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031128363</subfield><subfield code="9">978-3-031-12836-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1350767092</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049588438</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">323.448</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Torra, Vicenç</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1127080679</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guide to data privacy</subfield><subfield code="b">Models, technologies, solutions</subfield><subfield code="c">Vicenç Torra</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 313 Seiten</subfield><subfield code="b">Illustrationen, Diagramme (teilweise farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Undergraduate topics in computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection—Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology—Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-12837-0</subfield></datafield></record></collection> |
id | DE-604.BV049588438 |
illustrated | Illustrated |
index_date | 2024-07-03T23:33:00Z |
indexdate | 2024-07-20T07:24:45Z |
institution | BVB |
isbn | 9783031128363 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034933168 |
oclc_num | 1350767092 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xvi, 313 Seiten Illustrationen, Diagramme (teilweise farbig) |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
series2 | Undergraduate topics in computer science |
spelling | Torra, Vicenç Verfasser (DE-588)1127080679 aut Guide to data privacy Models, technologies, solutions Vicenç Torra Cham Springer [2022] © 2022 xvi, 313 Seiten Illustrationen, Diagramme (teilweise farbig) txt rdacontent n rdamedia nc rdacarrier Undergraduate topics in computer science Privacy Data and Information Security Cryptology Information Ethics Computers and Society Data protection—Law and legislation Data protection Cryptography Data encryption (Computer science) Information technology—Moral and ethical aspects Computers and civilization Erscheint auch als Online-Ausgabe 978-3-031-12837-0 |
spellingShingle | Torra, Vicenç Guide to data privacy Models, technologies, solutions Privacy Data and Information Security Cryptology Information Ethics Computers and Society Data protection—Law and legislation Data protection Cryptography Data encryption (Computer science) Information technology—Moral and ethical aspects Computers and civilization |
title | Guide to data privacy Models, technologies, solutions |
title_auth | Guide to data privacy Models, technologies, solutions |
title_exact_search | Guide to data privacy Models, technologies, solutions |
title_exact_search_txtP | Guide to Data Privacy Models, Technologies, Solutions |
title_full | Guide to data privacy Models, technologies, solutions Vicenç Torra |
title_fullStr | Guide to data privacy Models, technologies, solutions Vicenç Torra |
title_full_unstemmed | Guide to data privacy Models, technologies, solutions Vicenç Torra |
title_short | Guide to data privacy |
title_sort | guide to data privacy models technologies solutions |
title_sub | Models, technologies, solutions |
topic | Privacy Data and Information Security Cryptology Information Ethics Computers and Society Data protection—Law and legislation Data protection Cryptography Data encryption (Computer science) Information technology—Moral and ethical aspects Computers and civilization |
topic_facet | Privacy Data and Information Security Cryptology Information Ethics Computers and Society Data protection—Law and legislation Data protection Cryptography Data encryption (Computer science) Information technology—Moral and ethical aspects Computers and civilization |
work_keys_str_mv | AT torravicenc guidetodataprivacymodelstechnologiessolutions |