|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
161481113X |
003 |
DE-627 |
005 |
20230309185746.0 |
007 |
tu |
008 |
150528s2015 sz ||||| 00| ||eng c |
020 |
|
|
|a 9783319172439
|c hbk
|9 978-3-319-17243-9
|
035 |
|
|
|a (DE-627)161481113X
|
035 |
|
|
|a (DE-576)433104775
|
035 |
|
|
|a (DE-599)BSZ433104775
|
035 |
|
|
|a (OCoLC)910376884
|
035 |
|
|
|a (OCoLC)910376884
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-CH
|c XA-DE
|
084 |
|
|
|a ST 276
|q BVB
|2 rvk
|0 (DE-625)rvk/143642:
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Lee, Newton
|e VerfasserIn
|0 (DE-588)1064117694
|0 (DE-627)812954122
|0 (DE-576)423646478
|4 aut
|
109 |
|
|
|a Lee, Newton
|
245 |
1 |
0 |
|a Counterterrorism and cybersecurity
|b total information awareness
|c Newton Lee
|
250 |
|
|
|a Second edition
|
264 |
|
1 |
|a Cham
|a Heidelberg [u.a.]
|b Springer
|c 2015
|
300 |
|
|
|a XV, 489 Seiten
|b Illustrationen, Diagramme
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data Protection
|
650 |
|
0 |
|a Data Mining
|
650 |
|
0 |
|a Multimedia systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
4 |
|a Computer Science
|
650 |
|
4 |
|a Computer Science
|
650 |
|
4 |
|a Data Mining
|
650 |
|
4 |
|a Data Protection
|
650 |
|
4 |
|a Multimedia systems
|
689 |
0 |
0 |
|d s
|0 (DE-588)4026894-9
|0 (DE-627)106286706
|0 (DE-576)208968407
|a Informatik
|2 gnd
|
689 |
0 |
1 |
|d s
|0 (DE-588)4011134-9
|0 (DE-627)106354213
|0 (DE-576)208891986
|a Datenschutz
|2 gnd
|
689 |
0 |
2 |
|d s
|0 (DE-588)4428654-5
|0 (DE-627)216935180
|0 (DE-576)212347217
|a Data Mining
|2 gnd
|
689 |
0 |
3 |
|d s
|0 (DE-588)4059534-1
|0 (DE-627)106143212
|0 (DE-576)209131136
|a Terrorismus
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
776 |
1 |
|
|z 9783319172446
|
776 |
0 |
8 |
|i Erscheint auch als
|a Lee, Newton: Counterterrorism and Cybersecurity
|
776 |
0 |
8 |
|i Online-Ausg.
|a Lee, Newton
|t Counterterrorism and Cybersecurity
|b 2nd ed. 2015
|d Cham : Springer, 2015
|h Online-Ressource (XV, 489 p. 120 illus, online resource)
|w (DE-627)1656392607
|w (DE-576)430172958
|z 9783319172446
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz433104775cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20150618172825
|3 Cover
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz433104775inh.htm
|m V:DE-576;B:DE-Frei85
|q application/pdf
|v 20160422095533
|3 Inhaltsverzeichnis
|
889 |
|
|
|w (DE-627)826273645
|
935 |
|
|
|a mkri
|
935 |
|
|
|i mdedup
|
936 |
r |
v |
|a ST 276
|b Datensicherung (physik.) und angewandte Kryptographie, Computerviren
|k Monografien
|k Software und -entwicklung
|k Datensicherung (physik.) und angewandte Kryptographie, Computerviren
|0 (DE-627)127148207X
|0 (DE-625)rvk/143642:
|0 (DE-576)20148207X
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 3186726778
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 161481113X
|
LOK |
|
|
|0 005 20160419114653
|
LOK |
|
|
|0 008 160318||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-Frei85
|c DE-627
|d DE-Frei85
|
LOK |
|
|
|0 852
|a DE-Frei85
|
LOK |
|
|
|0 852 1
|m p
|9 00
|
LOK |
|
|
|0 938
|k p
|
ORI |
|
|
|a SA-MARC-krimdoka001.raw
|