Handbook of computational approaches to counterterrorism
Otros Autores: | ; |
---|---|
Tipo de documento: | Print Libro |
Lenguaje: | Inglés |
Publicado: |
New York London
Springer
2013
|
En: | Año: 2013 |
Acceso en línea: |
Portada Índice Verlagsangaben (Verlag) |
Verificar disponibilidad: | HBZ Gateway |
Servicio de pedido Subito: | Pedir ahora. |
Palabras clave: | |
Publicación relacionada: | Online-Ausg.:
733279724 Onlineausg. u.d.T.: 165195772X |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 729483398 | ||
003 | DE-627 | ||
005 | 20220713113836.0 | ||
007 | tu | ||
008 | 121108s2013 xxu||||| 00| ||eng c | ||
016 | 7 | |a 016148003 |2 UK | |
020 | |a 1461453100 |c (hbk.) £99.50 |9 1-4614-5310-0 | ||
020 | |a 9781461453109 |c (hbk.) £99.50 |9 978-1-4614-5310-9 | ||
035 | |a (DE-627)729483398 | ||
035 | |a (DE-576)373306733 | ||
035 | |a (DE-599)BSZ373306733 | ||
035 | |a (OCoLC)934863588 | ||
035 | |a (OCoLC)934863588 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XD-US |c XA-DE |c XA-NL | ||
050 | 0 | |a MLCM 2015/42354 (H) | |
082 | 0 | |a 363.325170285 |q BSZ | |
084 | |a 3,6 |2 ssgn | ||
084 | |a 89.58 |2 bkl | ||
084 | |a 89.40 |2 bkl | ||
084 | |a 54.74 |2 bkl | ||
245 | 1 | 0 | |a Handbook of computational approaches to counterterrorism |c ed. by V. S. Subrahmanian |
263 | |a Erscheint: 01. November 2012 | ||
264 | 1 | |a New York |a London |b Springer |c 2013 | |
300 | |a XVII, 578 S. |b Ill., graph. Darst., Kt. |c 24 cm | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
650 | 0 | |a Terrorism | |
653 | 4 | |a Terrorism |a Prevention |a Data processing | |
655 | 7 | |a Aufsatzsammlung |0 (DE-588)4143413-4 |0 (DE-627)105605727 |0 (DE-576)209726091 |2 gnd-content | |
689 | 0 | 0 | |d s |0 (DE-588)4059534-1 |0 (DE-627)106143212 |0 (DE-576)209131136 |a Terrorismus |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4076308-0 |0 (DE-627)104364106 |0 (DE-576)209201428 |a Prävention |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4182342-4 |0 (DE-627)104482184 |0 (DE-576)210010967 |a Spionageabwehr |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4026926-7 |0 (DE-627)106286609 |0 (DE-576)208968547 |a Informationstechnik |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Subrahmanian, V. S. |d 1963- |0 (DE-588)113770898 |0 (DE-627)736269444 |0 (DE-576)378782940 |4 oth | |
776 | 0 | 8 | |i Online-Ausg. |t Handbook of computational approaches to counterterrorism |d New York, NY [u.a.] : Springer, 2013 |h Online-Ressource (XVII, 578 p. 187 illus., 116 illus. in color) |w (DE-627)733279724 |z 1283934027 |z 9781461453116 |z 9781283934022 |
776 | 0 | 8 | |i Onlineausg. u.d.T. |a Subrahmanian, V. S., 1963 - |t Handbook of Computational Approaches to Counterterrorism |d New York, NY : Springer, 2013 |h Online-Ressource (XVII, 578 p. 187 illus., 116 illus. in color, digital) |w (DE-627)165195772X |w (DE-576)377587532 |z 9781461453116 |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy1307/2012952102-d.html |v 2016-03-22 |x Verlag |3 Verlagsangaben |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz373306733inh.htm |m V:DE-576;B:DE-Frei85 |q application/pdf |v 20130213144321 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz373306733cov.jpg |m V:DE-576 |m X:springer |q image/jpeg |v 20130327142717 |3 Cover |
935 | |a mkri | ||
936 | b | k | |a 89.58 |j Politische Gewalt |0 (DE-627)106416960 |
936 | b | k | |a 89.40 |j Innere Beziehungen des Staates: Allgemeines |0 (DE-627)106414100 |
936 | b | k | |a 54.74 |j Maschinelles Sehen |0 (DE-627)10641030X |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3225802220 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 729483398 | ||
LOK | |0 005 20130207160417 | ||
LOK | |0 008 121106||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a SA-MARC-krimdoka001.raw |