Cyber Defense and Situational Awareness:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV042325969 | ||
003 | DE-604 | ||
005 | 20160527 | ||
007 | cr|uuu---uuuuu | ||
008 | 150204s2014 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319113913 |c Online |9 978-3-319-11391-3 | ||
024 | 7 | |a 10.1007/978-3-319-11391-3 |2 doi | |
035 | |a (OCoLC)902884616 | ||
035 | |a (DE-599)BVBBV042325969 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Cyber Defense and Situational Awareness |c Alexander Kott, Cliff Wang, Robert F. Erbacher (Editors) |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online-Ressource (XVII, 329 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v volume 62 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Codierung |0 (DE-588)4070059-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Codierung |0 (DE-588)4070059-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Kott, Alexander |4 edt | |
700 | 1 | |a Wang, Cliff |0 (DE-588)1047455986 |4 edt | |
700 | 1 | |a Erbacher, Robert F. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-11390-6 |
830 | 0 | |a Advances in Information Security |v volume 62 |w (DE-604)BV022281064 |9 62 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-11391-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762805&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762805&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027762805 | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11391-3 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819380632742002688 |
---|---|
adam_text | CYBER DEFENSE AND SITUATIONAL AWARENESS
/ KOTT, ALEXANDER
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PREVIEW
FOUNDATIONS AND CHALLENGES
CYBER AND KINETIC
FORMATION OF AWARENESS
NETWORK-WIDE AWARENESS
COGNITION AND TECHNOLOGY
COGNITIVE PROCESS
VISUALIZATION AND ANALYSTS
INFERENCE AND ONTOLOGY
LEARNING AND SEMANTICS
IMPACT ASSESSMENT
ATTACK PROJECTION
METRICS OF SECURITY
MISSION RESILIENCE
CONCLUDING THOUGHTS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBER DEFENSE AND SITUATIONAL AWARENESS
/ KOTT, ALEXANDER
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK IS THE FIRST PUBLICATION TO GIVE A COMPREHENSIVE, STRUCTURED
TREATMENT TO THE IMPORTANT TOPIC OF SITUATIONAL AWARENESS IN CYBER
DEFENSE. IT PRESENTS THE SUBJECT IN A LOGICAL, CONSISTENT, CONTINUOUS
DISCOURSE, COVERING KEY TOPICS SUCH AS FORMATION OF CYBER SITUATIONAL
AWARENESS, VISUALIZATION AND HUMAN FACTORS, AUTOMATED LEARNING AND
INFERENCE, USE OF ONTOLOGIES AND METRICS, PREDICTING AND ASSESSING
IMPACT OF CYBER ATTACKS, AND ACHIEVING RESILIENCE OF CYBER AND PHYSICAL
MISSION. CHAPTERS INCLUDE CASE STUDIES, RECENT RESEARCH RESULTS AND
PRACTICAL INSIGHTS DESCRIBED SPECIFICALLY FOR THIS BOOK. SITUATIONAL
AWARENESS IS EXCEPTIONALLY PROMINENT IN THE FIELD OF CYBER DEFENSE. IT
INVOLVES SCIENCE, TECHNOLOGY AND PRACTICE OF PERCEPTION, COMPREHENSION
AND PROJECTION OF EVENTS AND ENTITIES IN CYBER SPACE. CHAPTERS DISCUSS
THE DIFFICULTIES OF ACHIEVING CYBER SITUATIONAL AWARENESS – ALONG WITH
APPROACHES TO OVERCOMING THE DIFFICULTIES - IN THE RELATIVELY YOUNG
FIELD OF CYBER DEFENSE WHERE KEY PHENOMENA ARE SO UNLIKE THE MORE
CONVENTIONAL PHYSICAL WORLD. CYBER DEFENSE AND SITUATIONAL AWARENESS IS
DESIGNED AS A REFERENCE FOR PRACTITIONERS OF CYBER SECURITY AND
DEVELOPERS OF TECHNOLOGY SOLUTIONS FOR CYBER DEFENDERS. ADVANCED-LEVEL
STUDENTS AND RESEARCHERS FOCUSED ON SECURITY OF COMPUTER NETWORKS WILL
ALSO FIND THIS BOOK A VALUABLE RESOURCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Kott, Alexander Wang, Cliff Erbacher, Robert F. |
author2_role | edt edt edt |
author2_variant | a k ak c w cw r f e rf rfe |
author_GND | (DE-588)1047455986 |
author_facet | Kott, Alexander Wang, Cliff Erbacher, Robert F. |
building | Verbundindex |
bvnumber | BV042325969 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)902884616 (DE-599)BVBBV042325969 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-11391-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03863nam a2200733zcb4500</leader><controlfield tag="001">BV042325969</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160527 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150204s2014 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319113913</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-11391-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-11391-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)902884616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042325969</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Defense and Situational Awareness</subfield><subfield code="c">Alexander Kott, Cliff Wang, Robert F. Erbacher (Editors)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 329 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">volume 62</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kott, Alexander</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cliff</subfield><subfield code="0">(DE-588)1047455986</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Erbacher, Robert F.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-11390-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">volume 62</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">62</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762805&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762805&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027762805</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11391-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042325969 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:08:05Z |
institution | BVB |
isbn | 9783319113913 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027762805 |
oclc_num | 902884616 |
open_access_boolean | |
owner | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVII, 329 Seiten) Illustrationen |
psigel | ZDB-2-SCS ZDB-2-SCS_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spellingShingle | Cyber Defense and Situational Awareness Advances in Information Security Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung (DE-588)4070059-8 gnd |
subject_GND | (DE-588)4070059-8 |
title | Cyber Defense and Situational Awareness |
title_auth | Cyber Defense and Situational Awareness |
title_exact_search | Cyber Defense and Situational Awareness |
title_full | Cyber Defense and Situational Awareness Alexander Kott, Cliff Wang, Robert F. Erbacher (Editors) |
title_fullStr | Cyber Defense and Situational Awareness Alexander Kott, Cliff Wang, Robert F. Erbacher (Editors) |
title_full_unstemmed | Cyber Defense and Situational Awareness Alexander Kott, Cliff Wang, Robert F. Erbacher (Editors) |
title_short | Cyber Defense and Situational Awareness |
title_sort | cyber defense and situational awareness |
topic | Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung (DE-588)4070059-8 gnd |
topic_facet | Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer Science Systems and Data Security Data Encryption Information Systems Applications (incl. Internet) Informatik Codierung |
url | https://doi.org/10.1007/978-3-319-11391-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762805&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762805&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT kottalexander cyberdefenseandsituationalawareness AT wangcliff cyberdefenseandsituationalawareness AT erbacherrobertf cyberdefenseandsituationalawareness |