|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
277795443 |
003 |
DE-627 |
005 |
20230216181123.0 |
007 |
tu |
008 |
940310s1993 xxu||||| bb 00| ||eng c |
010 |
|
|
|a 92-56631
|
016 |
7 |
|
|a b9403591
|2 UK
|
020 |
|
|
|a 0899508405
|9 0-89950-840-5
|
035 |
|
|
|a (DE-627)277795443
|
035 |
|
|
|a (DE-576)037878190
|
035 |
|
|
|a (DE-599)GBV277795443
|
035 |
|
|
|a (OCoLC)231591184
|
035 |
|
|
|a (OCoLC)28294490
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XD-US
|
050 |
|
0 |
|a K564.C6
|
082 |
0 |
|
|a 016.343099/9
|
082 |
0 |
|
|a 016.3423999
|
082 |
0 |
|
|a 016.347303999
|
082 |
0 |
|
|a 016.343099/9
|a 016.3423999
|
100 |
1 |
|
|a Best, Reba A.
|4 aut
|
245 |
1 |
0 |
|a Computer law and software protection
|b a bibliography of crime, liability, abuse, and security, 1984 through 1992
|c compiled by Reba A. Best and D. Cheryn Picquet
|
264 |
|
1 |
|a Jefferson, N.C
|a London
|b McFarland
|c 1993
|
300 |
|
|
|a XIII, 239 S.
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
500 |
|
|
|a Continuation of Computer crime, abuse, liability and security: a comprehensive bibliography, 1970-1984: McFarland, 1985. - Includes indexes
|
583 |
1 |
|
|a Archivierung prüfen
|c 20200919
|f DE-640
|z 1
|2 pdager
|
650 |
|
0 |
|a Computers
|x Law and legislation
|x Bibliography
|
650 |
|
0 |
|a Computer crimes
|x Bibliography
|
650 |
|
0 |
|a Data Protection
|x Law and legislation
|x Bibliography
|
650 |
|
0 |
|a Software protection
|x Law and legislation
|x Bibliography
|
650 |
|
0 |
|a Computers
|x Law
|
653 |
|
0 |
|a Computers
|a Law and legislation
|a Bibliography
|
653 |
|
0 |
|a Computer crimes
|a Bibliography
|
653 |
|
0 |
|a Data protection
|a Law and legislation
|a Bibliography
|
653 |
|
0 |
|a Software protection
|a Law and legislation
|a Bibliography
|
655 |
|
7 |
|a Bibliografie
|y 1984-1992
|0 (DE-588)4006432-3
|0 (DE-627)104814519
|0 (DE-576)208865578
|2 gnd-content
|
655 |
|
7 |
|a Bibliografie
|0 (DE-588)4006432-3
|0 (DE-627)104814519
|0 (DE-576)208865578
|2 gnd-content
|
689 |
0 |
0 |
|d s
|0 (DE-588)4010452-7
|0 (DE-627)106357816
|0 (DE-576)208888128
|a Computerkriminalität
|2 gnd
|
689 |
0 |
|
|5 (DE-627)
|
689 |
1 |
0 |
|d s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
1 |
|
|5 (DE-627)
|
700 |
1 |
|
|a Picquet, D. Cheryn
|0 (DE-627)1235734749
|0 (DE-576)165734744
|4 aut
|
889 |
|
|
|w (DE-627)12684819X
|
935 |
|
|
|i mdedup
|
935 |
|
|
|i Blocktest
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
LOK |
|
|
|0 000 xxxxxcx a22 zn 4500
|
LOK |
|
|
|0 001 3229218353
|
LOK |
|
|
|0 003 DE-627
|
LOK |
|
|
|0 004 277795443
|
LOK |
|
|
|0 005 19981113000000
|
LOK |
|
|
|0 008 940310||||||||||||||||ger|||||||
|
LOK |
|
|
|0 040
|a DE-21
|c DE-627
|d DE-21
|
LOK |
|
|
|0 852
|a DE-21
|
LOK |
|
|
|0 852 1
|c KB 19 A 1494
|9 00
|
LOK |
|
|
|0 866
|x km-sma
|
LOK |
|
|
|0 935
|a rswk
|a krim
|
LOK |
|
|
|0 936ln
|a k4.7.5
|
ORI |
|
|
|a SA-MARC-krimdoka001.raw
|
SIG |
|
|
|a UB: KB 19 A 1494
|
TIM |
|
|
|a 100019840101_100019921231
|b 1984 - 1992
|