|
LDR
| 01525nam a22004335i 4500 |
|---|
| 001 | 3782 |
|---|
| 003 | CONS |
|---|
| 005 | 20121204202039.0 |
|---|
| 007 | cr nn 008mamaa |
|---|
| 008 | 101013s2011 xxu| s |||| 0|eng d |
|---|
| 020 | | . |
‡a9781441976598
‡9978-1-4419-7659-8 |
|---|
| 024 | 7 | . |
‡a10.1007/978-1-4419-7659-8
‡2doi |
|---|
| 035 | | . |
‡a(DE-He213)978-1-4419-7659-8 |
|---|
| 050 | | 4. |
‡aQA76.9.A25 |
|---|
| 072 | | 7. |
‡aUR
‡2bicssc |
|---|
| 072 | | 7. |
‡aUTN
‡2bicssc |
|---|
| 072 | | 7. |
‡aCOM053000
‡2bisacsh |
|---|
| 100 | 1 | . |
‡aForesti, Sara. |
|---|
| 245 | 1 | 0. |
‡aPreserving Privacy in Data Outsourcing
‡h[electronic resource] /
‡cby Sara Foresti. |
|---|
| 260 | | . |
‡aBoston, MA :
‡bSpringer US,
‡c2011. |
|---|
| 300 | | . |
‡aXVI, 180 p.
‡bdigital. |
|---|
| 490 | 0 | . |
‡aAdvances in Information Security,
‡x1568-2633 ;
‡v51 |
|---|
| 650 | | 0. |
‡aComputer science. |
|---|
| 650 | | 0. |
‡aData protection. |
|---|
| 650 | | 0. |
‡aData structures (Computer science). |
|---|
| 650 | | 0. |
‡aData encryption (Computer science). |
|---|
| 650 | | 0. |
‡aDatabase management. |
|---|
| 650 | | 0. |
‡aInformation storage and retrieval systems. |
|---|
| 650 | 1 | 4. |
‡aComputer Science. |
|---|
| 650 | 2 | 4. |
‡aSystems and Data Security. |
|---|
| 650 | 2 | 4. |
‡aData Encryption. |
|---|
| 650 | 2 | 4. |
‡aData Structures, Cryptology and Information Theory. |
|---|
| 650 | 2 | 4. |
‡aInformation Storage and Retrieval. |
|---|
| 650 | 2 | 4. |
‡aDatabase Management. |
|---|
| 710 | 2 | . |
‡aSpringerLink (Online service) |
|---|
| 773 | 0 | . |
‡tSpringer eBooks |
|---|
| 776 | 0 | 8. |
‡iPrinted edition:
‡z9781441976581 |
|---|
| 830 | | 0. |
‡aAdvances in Information Security,
‡x1568-2633 ;
‡v51 |
|---|
| 856 | 4 | 0. |
‡uhttp://dx.doi.org/10.1007/978-1-4419-7659-8
‡9CONS |
|---|
| 950 | | . |
‡aComputer Science (Springer-11645) |
|---|
| 901 | | . |
‡a3782
‡b
‡c3782
‡tbiblio
‡sSystem Local |
|---|