Information security practices: emerging threats and perspectives
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cham
Springer
2017
|
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 https://doi.org/10.1007/978-3-319-48947-6 |
Umfang: | 1 Online-Ressource (vii, 104 Seiten) Illustrationen, Diagramme |
ISBN: | 9783319489476 |
DOI: | 10.1007/978-3-319-48947-6 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV044024114 | ||
003 | DE-604 | ||
005 | 20181217 | ||
007 | cr|uuu---uuuuu | ||
008 | 170201s2017 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319489476 |c Online |9 978-3-319-48947-6 | ||
024 | 7 | |a 10.1007/978-3-319-48947-6 |2 doi | |
035 | |a (ZDB-2-ENG)978-3-319-48947-6 | ||
035 | |a (OCoLC)971201807 | ||
035 | |a (DE-599)BVBBV044024114 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-859 |a DE-860 |a DE-91 |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-573 |a DE-863 |a DE-706 |a DE-634 |a DE-862 |a DE-92 | ||
082 | 0 | |a 621.382 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ELT 000 |2 stub | ||
084 | |a MAS 000 |2 stub | ||
245 | 1 | 0 | |a Information security practices |b emerging threats and perspectives |c Issa Traoré, Ahmed Awad, Isaac Woungang - editors |
264 | 1 | |a Cham |b Springer |c 2017 | |
300 | |a 1 Online-Ressource (vii, 104 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
650 | 4 | |a Biometrics (Biology) | |
650 | 4 | |a System safety | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Biometrics | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Traoré, Issa |0 (DE-588)1130816095 |4 edt | |
700 | 1 | |a Awad, Ahmed |0 (DE-588)1131717651 |4 edt | |
700 | 1 | |a Woungang, Isaac |0 (DE-588)1043909540 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-48946-9 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-48947-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2017 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029431558 | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-634 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-1043 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-1046 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-Aug4 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-573 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-92 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-898 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-859 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-860 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-861 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-863 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-862 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-91 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-48947-6 |l DE-706 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2250726 |
---|---|
_version_ | 1822992365553451008 |
adam_text | |
any_adam_object | |
author2 | Traoré, Issa Awad, Ahmed Woungang, Isaac |
author2_role | edt edt edt |
author2_variant | i t it a a aa i w iw |
author_GND | (DE-588)1130816095 (DE-588)1131717651 (DE-588)1043909540 |
author_facet | Traoré, Issa Awad, Ahmed Woungang, Isaac |
building | Verbundindex |
bvnumber | BV044024114 |
classification_rvk | ST 277 |
classification_tum | ELT 000 MAS 000 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-3-319-48947-6 (OCoLC)971201807 (DE-599)BVBBV044024114 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Maschinenbau / Maschinenwesen Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-319-48947-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV044024114</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181217</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170201s2017 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319489476</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-48947-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-48947-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-3-319-48947-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)971201807</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044024114</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ELT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAS 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security practices</subfield><subfield code="b">emerging threats and perspectives</subfield><subfield code="c">Issa Traoré, Ahmed Awad, Isaac Woungang - editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vii, 104 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics (Biology)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Traoré, Issa</subfield><subfield code="0">(DE-588)1130816095</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Awad, Ahmed</subfield><subfield code="0">(DE-588)1131717651</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Woungang, Isaac</subfield><subfield code="0">(DE-588)1043909540</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-48946-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2017</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029431558</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-48947-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044024114 |
illustrated | Illustrated |
indexdate | 2025-02-02T13:00:27Z |
institution | BVB |
isbn | 9783319489476 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029431558 |
oclc_num | 971201807 |
open_access_boolean | |
owner | DE-859 DE-860 DE-91 DE-BY-TUM DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-863 DE-BY-FWS DE-706 DE-634 DE-862 DE-BY-FWS DE-92 |
owner_facet | DE-859 DE-860 DE-91 DE-BY-TUM DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-863 DE-BY-FWS DE-706 DE-634 DE-862 DE-BY-FWS DE-92 |
physical | 1 Online-Ressource (vii, 104 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-ENG ZDB-2-ENG_2017 |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
spellingShingle | Information security practices emerging threats and perspectives Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften |
title | Information security practices emerging threats and perspectives |
title_auth | Information security practices emerging threats and perspectives |
title_exact_search | Information security practices emerging threats and perspectives |
title_full | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang - editors |
title_fullStr | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang - editors |
title_full_unstemmed | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang - editors |
title_short | Information security practices |
title_sort | information security practices emerging threats and perspectives |
title_sub | emerging threats and perspectives |
topic | Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften |
topic_facet | Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-3-319-48947-6 |
work_keys_str_mv | AT traoreissa informationsecuritypracticesemergingthreatsandperspectives AT awadahmed informationsecuritypracticesemergingthreatsandperspectives AT woungangisaac informationsecuritypracticesemergingthreatsandperspectives |