|
LDR
| 01521nam a22004215i 4500 |
|---|
| 001 | 5664 |
|---|
| 003 | CONS |
|---|
| 005 | 20121026175337.0 |
|---|
| 007 | cr nn 008mamaa |
|---|
| 008 | 111026s2011 gw | s |||| 0|eng d |
|---|
| 020 | | . |
‡a9783642244742
‡9978-3-642-24474-2 |
|---|
| 024 | 7 | . |
‡a10.1007/978-3-642-24474-2
‡2doi |
|---|
| 035 | | . |
‡a(DE-He213)978-3-642-24474-2 |
|---|
| 050 | | 4. |
‡aQA76.9.A25 |
|---|
| 072 | | 7. |
‡aUR
‡2bicssc |
|---|
| 072 | | 7. |
‡aUTN
‡2bicssc |
|---|
| 072 | | 7. |
‡aCOM053000
‡2bisacsh |
|---|
| 100 | 1 | . |
‡aBasin, David. |
|---|
| 245 | 1 | 0. |
‡aApplied Information Security
‡h[electronic resource] :
‡bA Hands-on Approach /
‡cby David Basin, Patrick Schaller, Michael Schläpfer. |
|---|
| 260 | | . |
‡aBerlin, Heidelberg :
‡bSpringer Berlin Heidelberg,
‡c2011. |
|---|
| 300 | | . |
‡aXIV, 202p. 15 illus.
‡bdigital. |
|---|
| 650 | | 0. |
‡aComputer science. |
|---|
| 650 | | 0. |
‡aData protection. |
|---|
| 650 | | 0. |
‡aData structures (Computer science). |
|---|
| 650 | | 0. |
‡aInformation Systems. |
|---|
| 650 | | 0. |
‡aManagement information systems. |
|---|
| 650 | 1 | 4. |
‡aComputer Science. |
|---|
| 650 | 2 | 4. |
‡aSystems and Data Security. |
|---|
| 650 | 2 | 4. |
‡aData Structures, Cryptology and Information Theory. |
|---|
| 650 | 2 | 4. |
‡aManagement of Computing and Information Systems. |
|---|
| 650 | 2 | 4. |
‡aInnovation/Technology Management. |
|---|
| 650 | 2 | 4. |
‡aBusiness Information Systems. |
|---|
| 700 | 1 | . |
‡aSchaller, Patrick. |
|---|
| 700 | 1 | . |
‡aSchläpfer, Michael. |
|---|
| 710 | 2 | . |
‡aSpringerLink (Online service) |
|---|
| 773 | 0 | . |
‡tSpringer eBooks |
|---|
| 776 | 0 | 8. |
‡iPrinted edition:
‡z9783642244735 |
|---|
| 856 | 4 | 0. |
‡uhttp://dx.doi.org/10.1007/978-3-642-24474-2
‡9CONS |
|---|
| 950 | | . |
‡aComputer Science (Springer-11645) |
|---|
| 901 | | . |
‡a5664
‡b
‡c5664
‡tbiblio
‡sSystem Local |
|---|