Weiter zum Inhalt
UB der TUM
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporäre Merkliste: 0 temporär gemerkt (Voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Informationen Fernleihe
  • Chat
  • Tools
    • Suchhistorie
    • Freie Fernleihe
    • Erwerbungsvorschlag
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren/Gebühren
    • Profil
    • Suchhistorie
  • Log out
  • Login
  • Bücher & Journals
  • Papers
Erweitert
  • Sustainable Security Practices...
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Datensatz exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach RIS
  • Zur Merkliste hinzufügen
  • Temporär merken Aus der temporären Merkliste entfernen
  • Permalink
Export abgeschlossen — 
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Weitere beteiligte Personen: Kumar, Adarsh (HerausgeberIn), Ahuja, Neelu Jyothi (HerausgeberIn), Kaushik, Keshav (HerausgeberIn), Tomar, Deepak Singh (HerausgeberIn), Khan, Surbhi Bhatia (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Singapore Springer Nature Singapore 2024
Singapore Springer
Ausgabe:1st ed. 2024
Schriftenreihe:Contributions to Environmental Sciences & Innovative Business Technology
Schlagwörter:
Sustainability
Mobile and Network Security
Blockchain
Data Structures and Information Theory
Security Services
Cryptology
Computer networks / Security measures
Blockchains (Databases)
Data structures (Computer science)
Information theory
Data protection
Cryptography
Data encryption (Computer science)
Links:https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
https://doi.org/10.1007/978-981-97-0088-2
Umfang:1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color)
ISBN:9789819700882
ISSN:2731-8311
DOI:10.1007/978-981-97-0088-2
Internformat

MARC

LEADER 00000nam a2200000zcb4500
001 BV049673948
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 240503s2024 xx o|||| 00||| eng d
020 |a 9789819700882  |c Online  |9 978-981-9700-88-2 
024 7 |a 10.1007/978-981-97-0088-2  |2 doi 
035 |a (ZDB-2-EES)9789819700882 
035 |a (OCoLC)1437848436 
035 |a (DE-599)BVBBV049673948 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91  |a DE-19  |a DE-1028  |a DE-1046  |a DE-384  |a DE-M347  |a DE-188  |a DE-703  |a DE-1050  |a DE-739  |a DE-634  |a DE-824 
082 0 |a 304.2  |2 23 
084 |a GEO 000  |2 stub 
084 |a UMW 000  |2 stub 
245 1 0 |a Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications  |c edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan 
250 |a 1st ed. 2024 
264 1 |a Singapore  |b Springer Nature Singapore  |c 2024 
264 1 |a Singapore  |b Springer 
300 |a 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Contributions to Environmental Sciences & Innovative Business Technology  |x 2731-8311 
650 4 |a Sustainability 
650 4 |a Mobile and Network Security 
650 4 |a Blockchain 
650 4 |a Data Structures and Information Theory 
650 4 |a Security Services 
650 4 |a Cryptology 
650 4 |a Sustainability 
650 4 |a Computer networks / Security measures 
650 4 |a Blockchains (Databases) 
650 4 |a Data structures (Computer science) 
650 4 |a Information theory 
650 4 |a Data protection 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
700 1 |a Kumar, Adarsh  |4 edt 
700 1 |a Ahuja, Neelu Jyothi  |4 edt 
700 1 |a Kaushik, Keshav  |4 edt 
700 1 |a Tomar, Deepak Singh  |4 edt 
700 1 |a Khan, Surbhi Bhatia  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9700-87-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9700-89-9 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9700-90-5 
856 4 0 |u https://doi.org/10.1007/978-981-97-0088-2  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-EES 
940 1 |q ZDB-2-EES_2024 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035016895 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-634  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-1046  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-1028  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-1050  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-M347  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-91  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-384  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-19  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-703  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-824  |p ZDB-2-EES  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0088-2  |l DE-739  |p ZDB-2-EES  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2792527
_version_ 1821936793880100864
any_adam_object
author2 Kumar, Adarsh
Ahuja, Neelu Jyothi
Kaushik, Keshav
Tomar, Deepak Singh
Khan, Surbhi Bhatia
author2_role edt
edt
edt
edt
edt
author2_variant a k ak
n j a nj nja
k k kk
d s t ds dst
s b k sb sbk
author_facet Kumar, Adarsh
Ahuja, Neelu Jyothi
Kaushik, Keshav
Tomar, Deepak Singh
Khan, Surbhi Bhatia
building Verbundindex
bvnumber BV049673948
classification_tum GEO 000
UMW 000
collection ZDB-2-EES
ctrlnum (ZDB-2-EES)9789819700882
(OCoLC)1437848436
(DE-599)BVBBV049673948
dewey-full 304.2
dewey-hundreds 300 - Social sciences
dewey-ones 304 - Factors affecting social behavior
dewey-raw 304.2
dewey-search 304.2
dewey-sort 3304.2
dewey-tens 300 - Social sciences
discipline Soziologie
Geographie
doi_str_mv 10.1007/978-981-97-0088-2
edition 1st ed. 2024
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03481nam a2200769zcb4500</leader><controlfield tag="001">BV049673948</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240503s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819700882</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-9700-88-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-97-0088-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-EES)9789819700882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437848436</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049673948</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-824</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">304.2</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">GEO 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">UMW 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications</subfield><subfield code="c">edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Contributions to Environmental Sciences &amp; Innovative Business Technology</subfield><subfield code="x">2731-8311</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sustainability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blockchain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sustainability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Blockchains (Databases)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Adarsh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahuja, Neelu Jyothi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaushik, Keshav</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tomar, Deepak Singh</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Surbhi Bhatia</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9700-87-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9700-89-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9700-90-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-EES</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-EES_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035016895</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-1028</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0088-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-EES</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049673948
illustrated Not Illustrated
indexdate 2024-12-20T20:18:43Z
institution BVB
isbn 9789819700882
issn 2731-8311
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035016895
oclc_num 1437848436
open_access_boolean
owner DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-1028
DE-1046
DE-384
DE-M347
DE-188
DE-703
DE-1050
DE-739
DE-634
DE-824
owner_facet DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-1028
DE-1046
DE-384
DE-M347
DE-188
DE-703
DE-1050
DE-739
DE-634
DE-824
physical 1 Online-Ressource (XII, 314 p. 138 illus., 113 illus. in color)
psigel ZDB-2-EES
ZDB-2-EES_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Springer Nature Singapore
Springer
record_format marc
series2 Contributions to Environmental Sciences & Innovative Business Technology
spellingShingle Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
Sustainability
Mobile and Network Security
Blockchain
Data Structures and Information Theory
Security Services
Cryptology
Computer networks / Security measures
Blockchains (Databases)
Data structures (Computer science)
Information theory
Data protection
Cryptography
Data encryption (Computer science)
title Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
title_auth Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
title_exact_search Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
title_full Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan
title_fullStr Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan
title_full_unstemmed Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications edited by Adarsh Kumar, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, Surbhi Bhatia Khan
title_short Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
title_sort sustainable security practices using blockchain quantum and post quantum technologies for real time applications
topic Sustainability
Mobile and Network Security
Blockchain
Data Structures and Information Theory
Security Services
Cryptology
Computer networks / Security measures
Blockchains (Databases)
Data structures (Computer science)
Information theory
Data protection
Cryptography
Data encryption (Computer science)
topic_facet Sustainability
Mobile and Network Security
Blockchain
Data Structures and Information Theory
Security Services
Cryptology
Computer networks / Security measures
Blockchains (Databases)
Data structures (Computer science)
Information theory
Data protection
Cryptography
Data encryption (Computer science)
url https://doi.org/10.1007/978-981-97-0088-2
work_keys_str_mv AT kumaradarsh sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications
AT ahujaneelujyothi sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications
AT kaushikkeshav sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications
AT tomardeepaksingh sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications
AT khansurbhibhatia sustainablesecuritypracticesusingblockchainquantumandpostquantumtechnologiesforrealtimeapplications
  • Verfügbarkeit
Bestellen (Login erforderlich)
Online lesen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt