Information security practices: emerging threats and perspectives
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schlagwörter: | |
Umfang: | vii, 104 Seiten Illustrationen, Diagramme (farbig) |
ISBN: | 9783319489469 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044288088 | ||
003 | DE-604 | ||
005 | 20170929 | ||
007 | t| | ||
008 | 170427s2017 xx a||| |||| 00||| eng d | ||
020 | |a 9783319489469 |c hbk |9 978-3-319-48946-9 | ||
035 | |a (OCoLC)992480866 | ||
035 | |a (DE-599)BVBBV044288088 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 621.382 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Information security practices |b emerging threats and perspectives |c Issa Traoré, Ahmed Awad, Isaac Woungang, editors |
264 | 1 | |a Cham |b Springer |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a vii, 104 Seiten |b Illustrationen, Diagramme (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
650 | 4 | |a Biometrics (Biology) | |
650 | 4 | |a System safety | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Biometrics | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Traoré, Issa |0 (DE-588)1130816095 |4 edt | |
700 | 1 | |a Awad, Ahmed |0 (DE-588)1131717651 |4 edt | |
700 | 1 | |a Woungang, Isaac |0 (DE-588)1043909540 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-48947-6 |w (DE-604)BV044024114 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029692261 |
Datensatz im Suchindex
_version_ | 1822950663463632896 |
---|---|
adam_text | |
any_adam_object | |
author2 | Traoré, Issa Awad, Ahmed Woungang, Isaac |
author2_role | edt edt edt |
author2_variant | i t it a a aa i w iw |
author_GND | (DE-588)1130816095 (DE-588)1131717651 (DE-588)1043909540 |
author_facet | Traoré, Issa Awad, Ahmed Woungang, Isaac |
building | Verbundindex |
bvnumber | BV044288088 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)992480866 (DE-599)BVBBV044288088 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV044288088</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170929</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">170427s2017 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319489469</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-319-48946-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992480866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044288088</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security practices</subfield><subfield code="b">emerging threats and perspectives</subfield><subfield code="c">Issa Traoré, Ahmed Awad, Isaac Woungang, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">vii, 104 Seiten</subfield><subfield code="b">Illustrationen, Diagramme (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics (Biology)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Traoré, Issa</subfield><subfield code="0">(DE-588)1130816095</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Awad, Ahmed</subfield><subfield code="0">(DE-588)1131717651</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Woungang, Isaac</subfield><subfield code="0">(DE-588)1043909540</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-48947-6</subfield><subfield code="w">(DE-604)BV044024114</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029692261</subfield></datafield></record></collection> |
id | DE-604.BV044288088 |
illustrated | Illustrated |
indexdate | 2025-02-02T13:00:27Z |
institution | BVB |
isbn | 9783319489469 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029692261 |
oclc_num | 992480866 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | vii, 104 Seiten Illustrationen, Diagramme (farbig) |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
spelling | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang, editors Cham Springer [2017] © 2017 vii, 104 Seiten Illustrationen, Diagramme (farbig) txt rdacontent n rdamedia nc rdacarrier Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften Traoré, Issa (DE-588)1130816095 edt Awad, Ahmed (DE-588)1131717651 edt Woungang, Isaac (DE-588)1043909540 edt Erscheint auch als Online-Ausgabe 978-3-319-48947-6 (DE-604)BV044024114 |
spellingShingle | Information security practices emerging threats and perspectives Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften |
title | Information security practices emerging threats and perspectives |
title_auth | Information security practices emerging threats and perspectives |
title_exact_search | Information security practices emerging threats and perspectives |
title_full | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang, editors |
title_fullStr | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang, editors |
title_full_unstemmed | Information security practices emerging threats and perspectives Issa Traoré, Ahmed Awad, Isaac Woungang, editors |
title_short | Information security practices |
title_sort | information security practices emerging threats and perspectives |
title_sub | emerging threats and perspectives |
topic | Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften |
topic_facet | Engineering Computer security Computers Biometrics (Biology) System safety Electrical engineering Communications Engineering, Networks Information Systems and Communication Service Systems and Data Security Security Science and Technology Biometrics Ingenieurwissenschaften |
work_keys_str_mv | AT traoreissa informationsecuritypracticesemergingthreatsandperspectives AT awadahmed informationsecuritypracticesemergingthreatsandperspectives AT woungangisaac informationsecuritypracticesemergingthreatsandperspectives |