Saved in:
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044979911 | ||
003 | DE-604 | ||
005 | 20200218 | ||
007 | cr|uuu---uuuuu | ||
008 | 180601s2018 xx o|||| 00||| eng d | ||
020 | |a 9783319684369 |c Online |9 978-3-319-68436-9 | ||
024 | 7 | |a 10.1007/978-3-319-68436-9 |2 doi | |
035 | |a (ZDB-2-SCS)9783319684369 | ||
035 | |a (OCoLC)1038764298 | ||
035 | |a (DE-599)BVBBV044979911 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-11 | ||
082 | 0 | |a 005.74 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a MH 50950 |0 (DE-625)122902:12227 |2 rvk | ||
100 | 1 | |a Austin, Greg |e Verfasser |0 (DE-588)1140258923 |4 aut | |
245 | 1 | 0 | |a Cybersecurity in China |b the next wave |c Greg Austin |
264 | 1 | |a Cham |b Springer |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (XXI, 130 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in cybersecurity |x 2193-973X | |
650 | 4 | |a Computer science | |
650 | 4 | |a Public policy | |
650 | 4 | |a Management information systems | |
650 | 4 | |a International criminal law | |
650 | 4 | |a Electronics | |
650 | 4 | |a Microelectronics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Public Policy | |
650 | 4 | |a International Criminal Law | |
650 | 4 | |a Electronics and Microelectronics, Instrumentation | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
653 | |a JPP | ||
653 | |a Chinese Information Security | ||
653 | |a Cyber Security | ||
653 | |a Security Policy | ||
653 | |a Information Assurance | ||
653 | |a World Rankings | ||
689 | 0 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-68435-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-68436-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2018 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030372304 | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-898 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-863 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-862 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-523 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-706 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-68436-9 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Record in the Search Index
DE-BY-OTHR_katkey | 6029636 |
---|---|
DE-BY-UBR_katkey | 6029636 |
_version_ | 1835102755822239744 |
any_adam_object | |
author | Austin, Greg |
author_GND | (DE-588)1140258923 |
author_facet | Austin, Greg |
author_role | aut |
author_sort | Austin, Greg |
author_variant | g a ga |
building | Verbundindex |
bvnumber | BV044979911 |
classification_rvk | ST 277 MH 50950 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783319684369 (OCoLC)1038764298 (DE-599)BVBBV044979911 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Politologie |
doi_str_mv | 10.1007/978-3-319-68436-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04232nam a2200889 c 4500</leader><controlfield tag="001">BV044979911</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200218 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180601s2018 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319684369</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-68436-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-68436-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319684369</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1038764298</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044979911</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MH 50950</subfield><subfield code="0">(DE-625)122902:12227</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Austin, Greg</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1140258923</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity in China</subfield><subfield code="b">the next wave</subfield><subfield code="c">Greg Austin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXI, 130 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in cybersecurity</subfield><subfield code="x">2193-973X</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International criminal law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microelectronics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public Policy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Criminal Law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronics and Microelectronics, Instrumentation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">JPP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Chinese Information Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Policy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Assurance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">World Rankings</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-68435-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030372304</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-68436-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | China (DE-588)4009937-4 gnd |
geographic_facet | China |
id | DE-604.BV044979911 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:15:44Z |
institution | BVB |
isbn | 9783319684369 |
issn | 2193-973X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030372304 |
oclc_num | 1038764298 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-11 |
owner_facet | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-11 |
physical | 1 Online-Ressource (XXI, 130 Seiten) |
psigel | ZDB-2-SCS ZDB-2-SCS_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in cybersecurity |
spellingShingle | Austin, Greg Cybersecurity in China the next wave Computer science Public policy Management information systems International criminal law Electronics Microelectronics Computer Science Management of Computing and Information Systems Public Policy International Criminal Law Electronics and Microelectronics, Instrumentation Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4009937-4 |
title | Cybersecurity in China the next wave |
title_auth | Cybersecurity in China the next wave |
title_exact_search | Cybersecurity in China the next wave |
title_full | Cybersecurity in China the next wave Greg Austin |
title_fullStr | Cybersecurity in China the next wave Greg Austin |
title_full_unstemmed | Cybersecurity in China the next wave Greg Austin |
title_short | Cybersecurity in China |
title_sort | cybersecurity in china the next wave |
title_sub | the next wave |
topic | Computer science Public policy Management information systems International criminal law Electronics Microelectronics Computer Science Management of Computing and Information Systems Public Policy International Criminal Law Electronics and Microelectronics, Instrumentation Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Public policy Management information systems International criminal law Electronics Microelectronics Computer Science Management of Computing and Information Systems Public Policy International Criminal Law Electronics and Microelectronics, Instrumentation Computersicherheit China |
url | https://doi.org/10.1007/978-3-319-68436-9 |
work_keys_str_mv | AT austingreg cybersecurityinchinathenextwave |
Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).