Surveillance in action: technologies for civilian, military and cyber surveillance
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cham, Switzerland
Springer
[2018]
|
Schriftenreihe: | Advanced sciences and technologies for security applications
|
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-3-319-68533-5 https://doi.org/10.1007/978-3-319-68533-5 https://doi.org/10.1007/978-3-319-68533-5 https://doi.org/10.1007/978-3-319-68533-5 https://doi.org/10.1007/978-3-319-68533-5 https://doi.org/10.1007/978-3-319-68533-5 |
Beschreibung: | Literaturangaben |
Umfang: | 1 Online-Ressource (XIV, 412 Seiten) Illustrationen, Diagramme |
ISBN: | 9783319685335 |
DOI: | 10.1007/978-3-319-68533-5 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV044664598 | ||
003 | DE-604 | ||
005 | 20201022 | ||
007 | cr|uuu---uuuuu | ||
008 | 171204s2018 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319685335 |9 978-3-319-68533-5 | ||
024 | 7 | |a 10.1007/978-3-319-68533-5 |2 doi | |
035 | |a (ZDB-2-POS)9783319685335 | ||
035 | |a (OCoLC)1014076796 | ||
035 | |a (DE-599)BVBBV044664598 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-739 |a DE-91 |a DE-473 |a DE-703 |a DE-188 | ||
082 | 0 | |a 355 |2 23 | |
084 | |a POL 000 |2 stub | ||
245 | 1 | 0 | |a Surveillance in action |b technologies for civilian, military and cyber surveillance |c Panagiotis Karampelas, Thirimachos Bourlai (editors) |
264 | 1 | |a Cham, Switzerland |b Springer |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (XIV, 412 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced sciences and technologies for security applications | |
500 | |a Literaturangaben | ||
650 | 4 | |a Political science | |
650 | 4 | |a Politics and war | |
650 | 4 | |a Pattern recognition | |
650 | 4 | |a Biometrics (Biology) | |
650 | 4 | |a System safety | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Political Science and International Relations | |
650 | 4 | |a Military and Defence Studies | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Pattern Recognition | |
650 | 4 | |a Biometrics | |
650 | 4 | |a Security Science and Technology | |
700 | 1 | |a Karampelas, Panagiotis |4 edt | |
700 | 1 | |a Bourlai, Thirimachos |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-68532-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-68533-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-POS | ||
940 | 1 | |q ZDB-2-POS_2018 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030062046 | |
966 | e | |u https://doi.org/10.1007/978-3-319-68533-5 |l DE-91 |p ZDB-2-POS |q TUM_PDA_POS_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68533-5 |l DE-473 |p ZDB-2-POS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68533-5 |l DE-703 |p ZDB-2-POS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68533-5 |l DE-706 |p ZDB-2-POS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68533-5 |l DE-739 |p ZDB-2-POS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2300364 |
---|---|
_version_ | 1821935797714026496 |
any_adam_object | |
author2 | Karampelas, Panagiotis Bourlai, Thirimachos |
author2_role | edt edt |
author2_variant | p k pk t b tb |
author_facet | Karampelas, Panagiotis Bourlai, Thirimachos |
building | Verbundindex |
bvnumber | BV044664598 |
classification_tum | POL 000 |
collection | ZDB-2-POS |
ctrlnum | (ZDB-2-POS)9783319685335 (OCoLC)1014076796 (DE-599)BVBBV044664598 |
dewey-full | 355 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355 |
dewey-search | 355 |
dewey-sort | 3355 |
dewey-tens | 350 - Public administration and military science |
discipline | Politologie Militärwissenschaft |
doi_str_mv | 10.1007/978-3-319-68533-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02379nam a2200601zc 4500</leader><controlfield tag="001">BV044664598</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201022 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">171204s2018 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319685335</subfield><subfield code="9">978-3-319-68533-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-68533-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-POS)9783319685335</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1014076796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044664598</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">POL 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Surveillance in action</subfield><subfield code="b">technologies for civilian, military and cyber surveillance</subfield><subfield code="c">Panagiotis Karampelas, Thirimachos Bourlai (editors)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 412 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced sciences and technologies for security applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Political science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politics and war</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics (Biology)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Political Science and International Relations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military and Defence Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pattern Recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karampelas, Panagiotis</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bourlai, Thirimachos</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-68532-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-68533-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-POS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-POS_2018</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030062046</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68533-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-POS</subfield><subfield code="q">TUM_PDA_POS_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68533-5</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-POS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68533-5</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-POS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68533-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-POS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68533-5</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-POS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044664598 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:08:26Z |
institution | BVB |
isbn | 9783319685335 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030062046 |
oclc_num | 1014076796 |
open_access_boolean | |
owner | DE-706 DE-739 DE-91 DE-BY-TUM DE-473 DE-BY-UBG DE-703 DE-188 |
owner_facet | DE-706 DE-739 DE-91 DE-BY-TUM DE-473 DE-BY-UBG DE-703 DE-188 |
physical | 1 Online-Ressource (XIV, 412 Seiten) Illustrationen, Diagramme |
psigel | ZDB-2-POS ZDB-2-POS_2018 ZDB-2-POS TUM_PDA_POS_Kauf |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series2 | Advanced sciences and technologies for security applications |
spellingShingle | Surveillance in action technologies for civilian, military and cyber surveillance Political science Politics and war Pattern recognition Biometrics (Biology) System safety Computer crimes Political Science and International Relations Military and Defence Studies Cybercrime Pattern Recognition Biometrics Security Science and Technology |
title | Surveillance in action technologies for civilian, military and cyber surveillance |
title_auth | Surveillance in action technologies for civilian, military and cyber surveillance |
title_exact_search | Surveillance in action technologies for civilian, military and cyber surveillance |
title_full | Surveillance in action technologies for civilian, military and cyber surveillance Panagiotis Karampelas, Thirimachos Bourlai (editors) |
title_fullStr | Surveillance in action technologies for civilian, military and cyber surveillance Panagiotis Karampelas, Thirimachos Bourlai (editors) |
title_full_unstemmed | Surveillance in action technologies for civilian, military and cyber surveillance Panagiotis Karampelas, Thirimachos Bourlai (editors) |
title_short | Surveillance in action |
title_sort | surveillance in action technologies for civilian military and cyber surveillance |
title_sub | technologies for civilian, military and cyber surveillance |
topic | Political science Politics and war Pattern recognition Biometrics (Biology) System safety Computer crimes Political Science and International Relations Military and Defence Studies Cybercrime Pattern Recognition Biometrics Security Science and Technology |
topic_facet | Political science Politics and war Pattern recognition Biometrics (Biology) System safety Computer crimes Political Science and International Relations Military and Defence Studies Cybercrime Pattern Recognition Biometrics Security Science and Technology |
url | https://doi.org/10.1007/978-3-319-68533-5 |
work_keys_str_mv | AT karampelaspanagiotis surveillanceinactiontechnologiesforcivilianmilitaryandcybersurveillance AT bourlaithirimachos surveillanceinactiontechnologiesforcivilianmilitaryandcybersurveillance |