iX kompakt (2019): IT-Sicherheit
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Deutsch |
Veröffentlicht: |
Hannover
Heise Medien
2019
|
Schriftenreihe: | iX
|
Schlagwörter: | |
Links: | https://ebookcentral.proquest.com/lib/th-brandenburg/detail.action?docID=5788182 https://nbn-resolving.org/urn:nbn:de:101:1-2019052302404244363427 http://d-nb.info/1186887656/34 http://www.heise-medien.de |
Umfang: | Online-Ressource, 156 Seiten |
ISBN: | 9783957882400 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046658630 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200407s2019 gw o|||| 00||| ger d | ||
015 | |a 19,O06 |2 dnb | ||
016 | 7 | |a 1186887656 |2 DE-101 | |
020 | |a 9783957882400 |9 978-3-95788-240-0 | ||
024 | 7 | |a urn:nbn:de:101:1-2019052302404244363427 |2 urn | |
024 | 3 | |a 9783957882400 | |
035 | |a (OCoLC)1109388107 | ||
035 | |a (DE-599)DNB1186887656 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a gw |c XA-DE-NI | ||
049 | |a DE-522 | ||
084 | |a 004 |2 sdnb | ||
100 | 0 | |a iX-Redaktion |e Verfasser |4 aut | |
245 | 1 | 0 | |a iX kompakt (2019) |b IT-Sicherheit |c iX-Redaktion |
264 | 1 | |a Hannover |b Heise Medien |c 2019 | |
300 | |a Online-Ressource, 156 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a iX | |
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |5 DE-101 |2 pdager | |
653 | |a Electronic book text | ||
653 | |a COM053000 | ||
653 | |a COM060040 | ||
653 | |a 9636 | ||
653 | |a iX | ||
653 | |a iX Magazin | ||
653 | |a Sicherheit | ||
653 | |a Security | ||
653 | |a IT-Sicherheit | ||
653 | |a Pentesting | ||
653 | |a DSGVO | ||
653 | |a Security Operations Center | ||
653 | |a Malware | ||
653 | |a Spectre | ||
653 | |a KI | ||
653 | |a TLS | ||
653 | |a Verschlüsselung | ||
653 | |a Postquaten-Kryptographie | ||
653 | |a Kryptographie | ||
653 | |a IT-Grundschutz | ||
653 | |a Grundschutz | ||
653 | |a Schwachstellen | ||
653 | |a Sicherheitlücken | ||
653 | |a Authentifizierung | ||
653 | |a LDAP | ||
653 | |a Mehrfaktor-Authentifizierung | ||
653 | |a Phishing | ||
653 | |a Command and Control | ||
653 | |a Krisenmanagement | ||
653 | |a Cyberresilience | ||
653 | |a Compliance | ||
653 | |a Datenschutz | ||
653 | |a DLP | ||
653 | |a ISO 27000 | ||
653 | |a ISMS | ||
653 | |a Hommingberger Gepardenforelle | ||
653 | |a 9630 | ||
856 | 4 | 0 | |u https://nbn-resolving.org/urn:nbn:de:101:1-2019052302404244363427 |x Resolving-System |
856 | 4 | 0 | |u http://d-nb.info/1186887656/34 |x Langzeitarchivierung Nationalbibliothek |
856 | 4 | 0 | |q application/pdf |u http://www.heise-medien.de |x Verlag |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032069753 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-brandenburg/detail.action?docID=5788182 |l DE-522 |p ZDB-30-PQE |q BFB-Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818986863173566464 |
---|---|
any_adam_object | |
author | iX-Redaktion |
author_facet | iX-Redaktion |
author_role | aut |
author_sort | iX-Redaktion |
author_variant | i r ir |
building | Verbundindex |
bvnumber | BV046658630 |
ctrlnum | (OCoLC)1109388107 (DE-599)DNB1186887656 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02491nam a2200841zc 4500</leader><controlfield tag="001">BV046658630</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200407s2019 gw o|||| 00||| ger d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">19,O06</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1186887656</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783957882400</subfield><subfield code="9">978-3-95788-240-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">urn:nbn:de:101:1-2019052302404244363427</subfield><subfield code="2">urn</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783957882400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1109388107</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1186887656</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NI</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">iX-Redaktion</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">iX kompakt (2019)</subfield><subfield code="b">IT-Sicherheit</subfield><subfield code="c">iX-Redaktion</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hannover</subfield><subfield code="b">Heise Medien</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online-Ressource, 156 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">iX</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="5">DE-101</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic book text</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">COM053000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">COM060040</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">9636</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">iX</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">iX Magazin</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Sicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Pentesting</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DSGVO</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Operations Center</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Malware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spectre</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KI</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">TLS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Verschlüsselung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Postquaten-Kryptographie</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kryptographie</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Grundschutz</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Grundschutz</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Schwachstellen</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sicherheitlücken</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Authentifizierung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">LDAP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mehrfaktor-Authentifizierung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Phishing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Command and Control</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Krisenmanagement</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberresilience</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Compliance</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Datenschutz</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DLP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ISO 27000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ISMS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hommingberger Gepardenforelle</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">9630</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:101:1-2019052302404244363427</subfield><subfield code="x">Resolving-System</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://d-nb.info/1186887656/34</subfield><subfield code="x">Langzeitarchivierung Nationalbibliothek</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="q">application/pdf</subfield><subfield code="u">http://www.heise-medien.de</subfield><subfield code="x">Verlag</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032069753</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-brandenburg/detail.action?docID=5788182</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">BFB-Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046658630 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:57:33Z |
institution | BVB |
isbn | 9783957882400 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032069753 |
oclc_num | 1109388107 |
open_access_boolean | |
owner | DE-522 |
owner_facet | DE-522 |
physical | Online-Ressource, 156 Seiten |
psigel | ZDB-30-PQE BFB-Kauf |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Heise Medien |
record_format | marc |
series2 | iX |
spelling | iX-Redaktion Verfasser aut iX kompakt (2019) IT-Sicherheit iX-Redaktion Hannover Heise Medien 2019 Online-Ressource, 156 Seiten txt rdacontent c rdamedia cr rdacarrier iX Archivierung/Langzeitarchivierung gewährleistet DE-101 pdager Electronic book text COM053000 COM060040 9636 iX Magazin Sicherheit Security IT-Sicherheit Pentesting DSGVO Security Operations Center Malware Spectre KI TLS Verschlüsselung Postquaten-Kryptographie Kryptographie IT-Grundschutz Grundschutz Schwachstellen Sicherheitlücken Authentifizierung LDAP Mehrfaktor-Authentifizierung Phishing Command and Control Krisenmanagement Cyberresilience Compliance Datenschutz DLP ISO 27000 ISMS Hommingberger Gepardenforelle 9630 https://nbn-resolving.org/urn:nbn:de:101:1-2019052302404244363427 Resolving-System http://d-nb.info/1186887656/34 Langzeitarchivierung Nationalbibliothek application/pdf http://www.heise-medien.de Verlag |
spellingShingle | iX-Redaktion iX kompakt (2019) IT-Sicherheit |
title | iX kompakt (2019) IT-Sicherheit |
title_auth | iX kompakt (2019) IT-Sicherheit |
title_exact_search | iX kompakt (2019) IT-Sicherheit |
title_full | iX kompakt (2019) IT-Sicherheit iX-Redaktion |
title_fullStr | iX kompakt (2019) IT-Sicherheit iX-Redaktion |
title_full_unstemmed | iX kompakt (2019) IT-Sicherheit iX-Redaktion |
title_short | iX kompakt (2019) |
title_sort | ix kompakt 2019 it sicherheit |
title_sub | IT-Sicherheit |
url | https://nbn-resolving.org/urn:nbn:de:101:1-2019052302404244363427 http://d-nb.info/1186887656/34 http://www.heise-medien.de |
work_keys_str_mv | AT ixredaktion ixkompakt2019itsicherheit |