|
|
|
|
LEADER |
00000cam a2200000Ka 4500 |
001 |
8899695 |
003 |
ICU |
005 |
20120829160200.0 |
006 |
m d |
007 |
cr cnu---unuuu |
008 |
111107s2011 gw ob 001 0 eng d |
016 |
7 |
|
|a 015975074
|2 Uk
|
020 |
|
|
|a 9783642244742 (electronic bk.)
|
020 |
|
|
|a 3642244742 (electronic bk.)
|
020 |
|
|
|z 9783642244735
|
035 |
|
|
|a (OCoLC)759858947
|
040 |
|
|
|a GW5XE
|c GW5XE
|d UKMGB
|d COO
|d E7B
|d YDXCP
|
049 |
|
|
|a CGUA
|
082 |
0 |
4 |
|a 005.8
|2 23
|
090 |
|
|
|a QA76.9.A25
|b B37 2011
|
100 |
1 |
|
|a Basin, David.
|0 http://id.loc.gov/authorities/names/n00092962
|1 http://viaf.org/viaf/42516100
|
245 |
1 |
0 |
|a Applied information security :
|b a hands-on approach /
|c David Basin, Patrick Schaller, Michael Schläpfer.
|
260 |
|
|
|a Berlin ;
|a Heidelberg :
|b Springer,
|c c2011.
|
300 |
|
|
|a 1 online resource (xiv, 202 p.)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/c
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/cr
|
504 |
|
|
|a Includes bibliographical references and index.
|
650 |
|
0 |
|a Computer security.
|0 http://id.loc.gov/authorities/subjects/sh90001862
|
650 |
|
0 |
|a Data encryption (Computer science)
|0 http://id.loc.gov/authorities/subjects/sh94001524
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh94001277
|
650 |
|
0 |
|a Data protection.
|0 http://id.loc.gov/authorities/subjects/sh85035859
|
653 |
|
4 |
|a Computer science
|
653 |
|
4 |
|a Data protection
|
653 |
|
4 |
|a Data structures (Computer science)
|
653 |
|
4 |
|a Information Systems
|
653 |
|
4 |
|a Management information systems
|
653 |
|
4 |
|a Systems and Data Security
|
653 |
|
4 |
|a Data Structures, Cryptology and Information Theory
|
653 |
|
4 |
|a Management of Computing and Information Systems
|
653 |
|
4 |
|a Innovation/Technology Management
|
653 |
|
4 |
|a Business Information Systems
|
655 |
|
4 |
|a Electronic books.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 http://id.worldcat.org/fast/fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 http://id.worldcat.org/fast/fst00872484
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 http://id.worldcat.org/fast/fst00887935
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 http://id.worldcat.org/fast/fst00887958
|
700 |
1 |
|
|a Schaller, Patrick.
|0 http://id.loc.gov/authorities/names/no2012139472
|1 http://viaf.org/viaf/312877776
|
700 |
1 |
|
|a Schläpfer, Michael.
|1 http://viaf.org/viaf/306128235
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-24474-2
|y SpringerLink
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (ICU)8899695
|
929 |
|
|
|a eresource
|
999 |
f |
f |
|i dc015ca4-43a0-5e5e-9d25-1c6ee14c7225
|s d9e23d7f-b2e2-55dc-843d-23e08407c841
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25 B37 2011
|l Online
|c UC-FullText
|u http://dx.doi.org/10.1007/978-3-642-24474-2
|z SpringerLink
|g ebooks
|i 11485415
|