Weiter zum Inhalt
UB der TUM
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporäre Merkliste: 0 temporär gemerkt (Voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Informationen Fernleihe
  • Chat
  • Tools
    • Suchhistorie
    • Freie Fernleihe
    • Erwerbungsvorschlag
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren/Gebühren
    • Profil
    • Suchhistorie
  • Log out
  • Login
  • Bücher & Journals
  • Papers
Erweitert
  • Network security attacks and c...
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Datensatz exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach RIS
  • Zur Merkliste hinzufügen
  • Temporär merken Aus der temporären Merkliste entfernen
  • Permalink
Export abgeschlossen — 
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Weitere beteiligte Personen: Kumar G., Dileep 1982- (HerausgeberIn), Singh, Manoj Kumar (HerausgeberIn), Jayanthi, M. K. 1976- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Hershey PA, USA Information Science Reference, an imprint of IGI Global [2016]
Schriftenreihe:Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
Links:http://www.igi-global.com/gateway/book/127617
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://www.igi-global.com/gateway/book/127617
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5
Umfang:1 Online-Ressource (xv, 357 Seiten)
ISBN:9781466687622
Internformat

MARC

LEADER 00000nam a2200000 c 4500
001 BV043355586
003 DE-604
005 20190918
007 cr|uuu---uuuuu
008 160210s2016 xx o|||| 00||| eng d
020 |a 9781466687622  |9 978-1-4666-8762-2 
024 7 |a 10.4018/978-1-4666-8761-5  |2 doi 
035 |a (OCoLC)955399768 
035 |a (DE-599)BVBBV043355586 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1049  |a DE-706  |a DE-29  |a DE-91  |a DE-573  |a DE-1050  |a DE-20  |a DE-898  |a DE-83 
245 1 0 |a Network security attacks and countermeasures  |c Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia) 
264 1 |a Hershey PA, USA  |b Information Science Reference, an imprint of IGI Global  |c [2016] 
264 4 |c © 2016 
300 |a 1 Online-Ressource (xv, 357 Seiten) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Advances in information security, privacy, and ethics (AISPE) book series 
490 0 |a Premier reference source 
700 1 |a Kumar G., Dileep  |d 1982-  |0 (DE-588)1113121394  |4 edt 
700 1 |a Singh, Manoj Kumar  |4 edt 
700 1 |a Jayanthi, M. K.  |d 1976-  |0 (DE-588)1168174627  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4666-8761-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1-4666-8761-4 
912 |a ZDB-98-IGB 
912 |a ZDB-1-IGE 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028774958 
966 e |u http://www.igi-global.com/gateway/book/127617  |x Verlag  |3 Volltext  |l DE-WWW1  |h ttp://www.igi-global.com/gateway/book/127617  |x Verlag  |3 Volltext  |l EBB01 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-1050  |p ZDB-98-IGB  |q FHD01_IGB_Kauf  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-573  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-1049  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-91  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-706  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://www.igi-global.com/gateway/book/127617  |l DE-29  |p ZDB-98-IGB  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-20  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-898  |p ZDB-1-IGE  |x Verlag  |3 Volltext 
966 e |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5  |l DE-83  |p ZDB-98-IGB  |q TUB_EBS_IGB  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-OTHR_katkey 6367195
DE-BY-TUM_katkey 2329217
_version_ 1831257465433358336
any_adam_object
author2 Kumar G., Dileep 1982-
Singh, Manoj Kumar
Jayanthi, M. K. 1976-
author2_role edt
edt
edt
author2_variant g d k gd gdk
m k s mk mks
m k j mk mkj
author_GND (DE-588)1113121394
(DE-588)1168174627
author_facet Kumar G., Dileep 1982-
Singh, Manoj Kumar
Jayanthi, M. K. 1976-
building Verbundindex
bvnumber BV043355586
collection ZDB-98-IGB
ZDB-1-IGE
ctrlnum (OCoLC)955399768
(DE-599)BVBBV043355586
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02938nam a2200493 c 4500</leader><controlfield tag="001">BV043355586</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190918 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160210s2016 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466687622</subfield><subfield code="9">978-1-4666-8762-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-8761-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)955399768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043355586</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security attacks and countermeasures</subfield><subfield code="c">Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">Information Science Reference, an imprint of IGI Global</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 357 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar G., Dileep</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)1113121394</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Manoj Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jayanthi, M. K.</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1168174627</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4666-8761-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-4666-8761-4</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028774958</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.igi-global.com/gateway/book/127617</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield><subfield code="l">DE-WWW1</subfield><subfield code="h">ttp://www.igi-global.com/gateway/book/127617</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield><subfield code="l">EBB01</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.igi-global.com/gateway/book/127617</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8761-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043355586
illustrated Not Illustrated
indexdate 2024-12-20T17:34:23Z
institution BVB
isbn 9781466687622
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028774958
oclc_num 955399768
open_access_boolean
owner DE-1049
DE-706
DE-29
DE-91
DE-BY-TUM
DE-573
DE-1050
DE-20
DE-898
DE-BY-UBR
DE-83
owner_facet DE-1049
DE-706
DE-29
DE-91
DE-BY-TUM
DE-573
DE-1050
DE-20
DE-898
DE-BY-UBR
DE-83
physical 1 Online-Ressource (xv, 357 Seiten)
psigel ZDB-98-IGB
ZDB-1-IGE
ZDB-98-IGB FHD01_IGB_Kauf
ZDB-98-IGB TUB_EBS_IGB
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Information Science Reference, an imprint of IGI Global
record_format marc
series2 Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
spellingShingle Network security attacks and countermeasures
title Network security attacks and countermeasures
title_auth Network security attacks and countermeasures
title_exact_search Network security attacks and countermeasures
title_full Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia)
title_fullStr Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia)
title_full_unstemmed Network security attacks and countermeasures Dileep Kumar G. (Adama Science and Technology University, Ethiopia), Manoj Kumar Singh (Adama Science and Technology University, Ethiopia), M.K. Jayanthi (King Khalid University, Saudi Arabia)
title_short Network security attacks and countermeasures
title_sort network security attacks and countermeasures
work_keys_str_mv AT kumargdileep networksecurityattacksandcountermeasures
AT singhmanojkumar networksecurityattacksandcountermeasures
AT jayanthimk networksecurityattacksandcountermeasures
  • Verfügbarkeit
Bestellen (Login erforderlich)
Online lesen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt