|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
1652495908 |
003 |
DE-627 |
005 |
20230526170115.0 |
007 |
cr uuu---uuuuu |
008 |
130704s2011 xx |||||o 00| ||eng c |
020 |
|
|
|a 9780123849175
|9 978-0-12-384917-5
|
035 |
|
|
|a (DE-627)1652495908
|
035 |
|
|
|a (DE-576)386829128
|
035 |
|
|
|a (DE-599)BSZ386829128
|
035 |
|
|
|a (OCoLC)855543421
|
035 |
|
|
|a (EBL)EBL610561
|
035 |
|
|
|a (EBR)ebr10429793
|
035 |
|
|
|a (RPAM)MIL288695
|
035 |
|
|
|a (EBC)EBC610561
|
035 |
|
|
|a (EBP)028694309
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
082 |
0 |
|
|a 363.32593843
|
084 |
|
|
|a 2,1
|2 ssgn
|
084 |
|
|
|a ST 277
|q SEPA
|2 rvk
|0 (DE-625)rvk/143643:
|
100 |
1 |
|
|a Amoroso, Edward G.
|4 aut
|
109 |
|
|
|a Amoroso, Edward G.
|a Amoroso, Edward
|
245 |
1 |
0 |
|a Cyber attacks
|b protecting national infrastructure
|c Edward G. Amoroso
|
264 |
|
1 |
|a Burlington
|b Butterworth-Heinemann
|c 2011
|
300 |
|
|
|a XI, 233 S.
|b Ill., graph. Darst.
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
533 |
|
|
|a Online-Ausg.
|d 2010
|e Online-Ressource
|7 |2010||||||||||
|
650 |
|
4 |
|a Electronic books
|
650 |
|
4 |
|a Computersicherheit
|
650 |
|
4 |
|a Information warfare
|
650 |
|
4 |
|a Computerkriminalität
|
653 |
|
4 |
|a Cyberterrorism
|a United States
|a Prevention
|
653 |
|
4 |
|a Computer security
|a United States
|
653 |
|
4 |
|a National security
|a United States
|
689 |
0 |
0 |
|d s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
0 |
|
|5 (DE-627)
|
776 |
1 |
|
|z 9780123849182
|
776 |
0 |
8 |
|i Druckausg.
|a Amoroso, Edward G.
|t Cyber attacks
|d Amsterdam [u.a.] : Butterworth-Heinemann/Elsevier, 2011
|h XI, 233 S.
|w (DE-627)63665219X
|w (DE-576)351683615
|z 9780123849175
|z 0123849179
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/kxp/detail.action?docID=610561
|x Aggregator
|3 Volltext
|
912 |
|
|
|a ZDB-30-PQE
|
912 |
|
|
|a ZDB-38-EBR
|
936 |
r |
v |
|a ST 277
|b Sonstiges zur Sicherheit in der Datenverarbeitung
|k Monografien
|k Software und -entwicklung
|k Sonstiges zur Sicherheit in der Datenverarbeitung
|0 (DE-627)1271118971
|0 (DE-625)rvk/143643:
|0 (DE-576)201118971
|
951 |
|
|
|a BO
|
ELC |
|
|
|a 1
|
ORI |
|
|
|a SA-MARC-krimdok_oa001.raw
|