SAP-Systeme schützen:
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Deutsch |
Veröffentlicht: |
Bonn
Rheinwerk Verlag
2016
|
Ausgabe: | 1. Auflage |
Schriftenreihe: | SAP PRESS
Rheinwerk Publishing |
Schlagwörter: | |
Links: | http://d-nb.info/1074838580/04 http://deposit.dnb.de/cgi-bin/dokserv?id=5337031&prov=M&dok_var=1&dok_ext=htm https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/ https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/autoren/ https://s3-eu-west-1.amazonaws.com/gxmedia.galileo-press.de/leseproben/3907/leseprobe_sappress_sap-systeme_schuetzen.pdf |
Beschreibung: | Auf dem Cover: "Schützen Sie Ihr SAP-System vor Hacking und Cyber-Angriffen!; Risiko- und Bedrohungsanalysen erstellen, Sicherheitsstrategien entwickeln; Sicherheit von Netzwerken, Passwörtern, Applikationsservern, Schnittstellen u.v.m." |
Umfang: | 426 Seiten Illustrationen |
ISBN: | 3836238519 9783836238519 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043379263 | ||
003 | DE-604 | ||
005 | 20160607 | ||
007 | t| | ||
008 | 160219s2016 xx a||| |||| 00||| ger d | ||
015 | |a 15,N33 |2 dnb | ||
015 | |a 16,A12 |2 dnb | ||
016 | 7 | |a 1074838580 |2 DE-101 | |
020 | |a 3836238519 |9 3-8362-3851-9 | ||
020 | |a 9783836238519 |c Festeinband : EUR 69.90 (DE), EUR 71.90 (AT), sfr 91.90 (freier Pr.) |9 978-3-8362-3851-9 | ||
024 | 3 | |a 9783836238519 | |
035 | |a (OCoLC)918614446 | ||
035 | |a (DE-599)DNB1074838580 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
049 | |a DE-91G |a DE-11 |a DE-859 |a DE-1051 |a DE-1102 |a DE-634 |a DE-29T |a DE-860 |a DE-573 |a DE-862 | ||
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 658.478 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 510 |0 (DE-625)143676: |2 rvk | ||
084 | |a ST 610 |0 (DE-625)143683: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 307f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a 650 |2 sdnb | ||
100 | 1 | |a Stumm, Holger |e Verfasser |0 (DE-588)139116834 |4 aut | |
245 | 1 | 0 | |a SAP-Systeme schützen |c Holger Stumm, Daniel Berlin |
250 | |a 1. Auflage | ||
264 | 1 | |a Bonn |b Rheinwerk Verlag |c 2016 | |
300 | |a 426 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a SAP PRESS | |
490 | 0 | |a Rheinwerk Publishing | |
500 | |a Auf dem Cover: "Schützen Sie Ihr SAP-System vor Hacking und Cyber-Angriffen!; Risiko- und Bedrohungsanalysen erstellen, Sicherheitsstrategien entwickeln; Sicherheit von Netzwerken, Passwörtern, Applikationsservern, Schnittstellen u.v.m." | ||
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a SAP |g Marke |0 (DE-588)4595331-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwaresystem |0 (DE-588)4137282-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
653 | |a U ; BIC Subject Heading | ||
653 | |a Hacking | ||
653 | |a Cyber-Angriff | ||
653 | |a Cyber Attack | ||
653 | |a Penetration | ||
653 | |a Sicherheit | ||
653 | |a Security | ||
653 | |a Netzwerk | ||
653 | |a SAP Enterprise Threat Detection | ||
653 | |a Firewall | ||
653 | |a Kali | ||
653 | |a Linux | ||
653 | |a Härtung | ||
653 | |a Hardening | ||
689 | 0 | 0 | |a SAP |g Marke |0 (DE-588)4595331-4 |D s |
689 | 0 | 1 | |a Softwaresystem |0 (DE-588)4137282-7 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | 4 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 5 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 6 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Berlin, Daniel |e Verfasser |4 aut | |
710 | 2 | |a Rheinwerk Verlag |0 (DE-588)1081738405 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-8362-3852-6 |
856 | 4 | 2 | |m B:DE-101 |q application/pdf |u http://d-nb.info/1074838580/04 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=5337031&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |q text/html |u https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/ |3 Ausführliche Beschreibung |
856 | 4 | 2 | |q text/html |u https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/autoren/ |3 Autorenbiografie |
856 | 4 | 2 | |q application/pdf |u https://s3-eu-west-1.amazonaws.com/gxmedia.galileo-press.de/leseproben/3907/leseprobe_sappress_sap-systeme_schuetzen.pdf |3 Auszug |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028797993 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 307f 2016 A 1606 |
---|---|
DE-BY-TUM_katkey | 2168335 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040008240593 |
_version_ | 1821932534689169409 |
any_adam_object | |
author | Stumm, Holger Berlin, Daniel |
author_GND | (DE-588)139116834 |
author_facet | Stumm, Holger Berlin, Daniel |
author_role | aut aut |
author_sort | Stumm, Holger |
author_variant | h s hs d b db |
building | Verbundindex |
bvnumber | BV043379263 |
classification_rvk | ST 276 ST 277 ST 510 ST 610 |
classification_tum | DAT 307f DAT 461f |
ctrlnum | (OCoLC)918614446 (DE-599)DNB1074838580 |
dewey-full | 005.8 658.478 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 658 - General management |
dewey-raw | 005.8 658.478 |
dewey-search | 005.8 658.478 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
edition | 1. Auflage |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03858nam a2200949 c 4500</leader><controlfield tag="001">BV043379263</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160607 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">160219s2016 xx a||| |||| 00||| ger d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">15,N33</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">16,A12</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1074838580</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3836238519</subfield><subfield code="9">3-8362-3851-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836238519</subfield><subfield code="c">Festeinband : EUR 69.90 (DE), EUR 71.90 (AT), sfr 91.90 (freier Pr.)</subfield><subfield code="9">978-3-8362-3851-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783836238519</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)918614446</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1074838580</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 510</subfield><subfield code="0">(DE-625)143676:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 610</subfield><subfield code="0">(DE-625)143683:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 307f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stumm, Holger</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)139116834</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SAP-Systeme schützen</subfield><subfield code="c">Holger Stumm, Daniel Berlin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk Verlag</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">426 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SAP PRESS</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk Publishing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "Schützen Sie Ihr SAP-System vor Hacking und Cyber-Angriffen!; Risiko- und Bedrohungsanalysen erstellen, Sicherheitsstrategien entwickeln; Sicherheit von Netzwerken, Passwörtern, Applikationsservern, Schnittstellen u.v.m."</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SAP</subfield><subfield code="g">Marke</subfield><subfield code="0">(DE-588)4595331-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwaresystem</subfield><subfield code="0">(DE-588)4137282-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U ; BIC Subject Heading</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-Angriff</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Netzwerk</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SAP Enterprise Threat Detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Firewall</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kali</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Linux</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Härtung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardening</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">SAP</subfield><subfield code="g">Marke</subfield><subfield code="0">(DE-588)4595331-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwaresystem</subfield><subfield code="0">(DE-588)4137282-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Berlin, Daniel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rheinwerk Verlag</subfield><subfield code="0">(DE-588)1081738405</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-8362-3852-6</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:DE-101</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://d-nb.info/1074838580/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=5337031&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/</subfield><subfield code="3">Ausführliche Beschreibung</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/autoren/</subfield><subfield code="3">Autorenbiografie</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">application/pdf</subfield><subfield code="u">https://s3-eu-west-1.amazonaws.com/gxmedia.galileo-press.de/leseproben/3907/leseprobe_sappress_sap-systeme_schuetzen.pdf</subfield><subfield code="3">Auszug</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028797993</subfield></datafield></record></collection> |
id | DE-604.BV043379263 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:34:53Z |
institution | BVB |
institution_GND | (DE-588)1081738405 |
isbn | 3836238519 9783836238519 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028797993 |
oclc_num | 918614446 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-11 DE-859 DE-1051 DE-1102 DE-634 DE-29T DE-860 DE-573 DE-862 DE-BY-FWS |
owner_facet | DE-91G DE-BY-TUM DE-11 DE-859 DE-1051 DE-1102 DE-634 DE-29T DE-860 DE-573 DE-862 DE-BY-FWS |
physical | 426 Seiten Illustrationen |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Rheinwerk Verlag |
record_format | marc |
series2 | SAP PRESS Rheinwerk Publishing |
spellingShingle | Stumm, Holger Berlin, Daniel SAP-Systeme schützen Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd Datensicherung (DE-588)4011144-1 gnd Cyberattacke (DE-588)1075612675 gnd SAP Marke (DE-588)4595331-4 gnd Computersicherheit (DE-588)4274324-2 gnd Softwaresystem (DE-588)4137282-7 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4825817-9 (DE-588)4113821-1 (DE-588)4011144-1 (DE-588)1075612675 (DE-588)4595331-4 (DE-588)4274324-2 (DE-588)4137282-7 (DE-588)4070085-9 |
title | SAP-Systeme schützen |
title_auth | SAP-Systeme schützen |
title_exact_search | SAP-Systeme schützen |
title_full | SAP-Systeme schützen Holger Stumm, Daniel Berlin |
title_fullStr | SAP-Systeme schützen Holger Stumm, Daniel Berlin |
title_full_unstemmed | SAP-Systeme schützen Holger Stumm, Daniel Berlin |
title_short | SAP-Systeme schützen |
title_sort | sap systeme schutzen |
topic | Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd Datensicherung (DE-588)4011144-1 gnd Cyberattacke (DE-588)1075612675 gnd SAP Marke (DE-588)4595331-4 gnd Computersicherheit (DE-588)4274324-2 gnd Softwaresystem (DE-588)4137282-7 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Penetrationstest Hacker Datensicherung Cyberattacke SAP Marke Computersicherheit Softwaresystem Rechnernetz |
url | http://d-nb.info/1074838580/04 http://deposit.dnb.de/cgi-bin/dokserv?id=5337031&prov=M&dok_var=1&dok_ext=htm https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/ https://www.rheinwerk-verlag.de/sap-systeme-schutzen_3907/autoren/ https://s3-eu-west-1.amazonaws.com/gxmedia.galileo-press.de/leseproben/3907/leseprobe_sappress_sap-systeme_schuetzen.pdf |
work_keys_str_mv | AT stummholger sapsystemeschutzen AT berlindaniel sapsystemeschutzen AT rheinwerkverlag sapsystemeschutzen |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 307f 2016 A 1606
Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |