IT-Sicherheit
Konzepte - Verfahren - Protokolle
Gespeichert in:
Verfasser / Beitragende:
von Claudia Eckert
Ort, Verlag, Jahr:
München :
Oldenbourg,
2009
Beschreibung:
XIV, 981 S. : Ill., graph. Darst. ; 25 cm
Format:
Buch
Ausgabe:
6., überarb. und erw. Aufl.
Online Zugang:
| LEADER | cam a22 2 4500 | ||
|---|---|---|---|
| 001 | 260760676 | ||
| 003 | CHVBK | ||
| 005 | 20200927170001.0 | ||
| 008 | 130816s2009 gw 000 0 ger d | ||
| 015 | |a GFR-CIP-09,N32,0019 | ||
| 015 | |a DNB-09,A45,0027 |2 dnb | ||
| 016 | 7 | |a 995367213 |2 GyFmDB | |
| 020 | |a 3-486-58999-7 | ||
| 020 | |a 978-3-486-58999-3 | ||
| 035 | |a (VAUD)991013533729702852 | ||
| 035 | |a (IDSBB)005146672 | ||
| 035 | |a (NEBIS)006196199 | ||
| 035 | |a (IDSLU)000757235 | ||
| 035 | |a (RNV)006309481-41bculausa_network | ||
| 035 | |a (RERO)006309481 | ||
| 035 | |a R006309481 | ||
| 035 | |a (EXLNZ-41BCULAUSA_NETWORK)991005724689702851 | ||
| 035 | |a (OCoLC)463676855 | ||
| 040 | |a GWDNB |d GBVCP |d HEBIS |d CHVBK |d DEBSZ |d DEBBG |d RERO labcue | ||
| 072 | 7 | |a s1in |2 rero | |
| 082 | 1 | |a 004 |2 15 | |
| 082 | 0 | 4 | |a 005.8 |2 DDC22ger |
| 084 | |a 681.32 |a BCUDhe |2 CLASBCUD | ||
| 084 | |a ST 276 |2 rvk | ||
| 084 | |a ST 277 |2 rvk | ||
| 084 | |a 004 |2 GyFmDB | ||
| 100 | 1 | |a Eckert |D Claudia |4 aut | |
| 245 | 1 | 0 | |a IT-Sicherheit |b Konzepte - Verfahren - Protokolle |c von Claudia Eckert |
| 250 | |a 6., überarb. und erw. Aufl. | ||
| 264 | 1 | |a München |b Oldenbourg |c 2009 | |
| 300 | |a XIV, 981 S. |b Ill., graph. Darst. |c 25 cm | ||
| 500 | |a Literaturverz. S. 945 - 968 | ||
| 650 | 7 | |a sécurité informatique |2 chrero | |
| 650 | 7 | |a chiffrement (informatique) |x système d'information (informatique) |2 chrero | |
| 650 | 7 | |a fiabilité |x sécurité |x technologie de l'information |2 chrero | |
| 650 | 7 | |a Computersicherheit |2 idsbb | |
| 650 | 7 | |a Datenübertragung |0 (DE-588)4011150-7 |2 gnd | |
| 650 | 7 | |a DATENKOMMUNIKATION (COMPUTERSYSTEME) |x ger |0 (ETHUDK)000061472 |2 ethudk | |
| 650 | 7 | |a DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) |x ger |0 (ETHUDK)000034698 |2 ethudk | |
| 650 | 7 | |a KRYPTOGRAPHIE (INFORMATIONSTHEORIE) |x ger |0 (ETHUDK)000042682 |2 ethudk | |
| 650 | 7 | |a LEHRBÜCHER (DOKUMENTENTYP) |x ger |0 (ETHUDK)000000099 |2 ethudk | |
| 650 | 7 | |a NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME) |x ger |0 (ETHUDK)000013758 |2 ethudk | |
| 650 | 7 | |a SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN) |x ger |0 (ETHUDK)000061425 |2 ethudk | |
| 650 | 7 | |a ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME) |x ger |0 (ETHUDK)000061582 |2 ethudk | |
| 650 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd | |
| 650 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd | |
| 650 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd | |
| 691 | 7 | |B u |a SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN) |z ger |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) |z ger |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a KRYPTOGRAPHIE (INFORMATIONSTHEORIE) |z ger |u 519.726,4 |2 nebis E1 | |
| 691 | 7 | |B u |a DATENKOMMUNIKATION (COMPUTERSYSTEME) |z ger |u 004*03*03*01 |2 nebis E1 | |
| 691 | 7 | |B u |a NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME) |z ger |u 004*03*03*03 |2 nebis E1 | |
| 691 | 7 | |B u |a ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME) |z ger |u 004*04*06*06*01 |2 nebis E1 | |
| 691 | 7 | |B u |a LEHRBÜCHER (DOKUMENTENTYP) |z ger |u (075) |2 nebis E1 | |
| 691 | 7 | |B u |a ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES) |z fre |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS) |z eng |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION) |z fre |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS) |z eng |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a CRYPTOGRAPHY (INFORMATION THEORY) |z eng |u 519.726,4 |2 nebis E1 | |
| 691 | 7 | |B u |a CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION) |z fre |u 519.726,4 |2 nebis E1 | |
| 691 | 7 | |B u |a DATA COMMUNICATIONS (COMPUTER SYSTEMS) |z eng |u 004*03*03*01 |2 nebis E1 | |
| 691 | 7 | |B u |a TRANSMISSION DE DONNÉES (SYSTÈMES INFORMATIQUES) |z fre |u 004*03*03*01 |2 nebis E1 | |
| 691 | 7 | |B u |a NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS) |z eng |u 004*03*03*03 |2 nebis E1 | |
| 691 | 7 | |B u |a PROTOCOLES DE COMMUNICATION + PROTOCOLES DE RÉSEAUX (SYSTÈMES INFORMATIQUES) |z fre |u 004*03*03*03 |2 nebis E1 | |
| 691 | 7 | |B u |a CONTRÔLE D'ACCÈS (SYSTÈMES D'EXPLOITATION) |z fre |u 004*04*06*06*01 |2 nebis E1 | |
| 691 | 7 | |B u |a ACCESS CONTROL (OPERATING SYSTEMS) |z eng |u 004*04*06*06*01 |2 nebis E1 | |
| 691 | 7 | |B u |a TEXTBOOKS (DOCUMENT TYPE) |z eng |u (075) |2 nebis E1 | |
| 691 | 7 | |B u |a MANUELS POUR L'ENSEIGNEMENT (TYPE DE DOCUMENT) |z fre |u (075) |2 nebis E1 | |
| 691 | 7 | |B u |u ST 276 |2 idslu LR | |
| 856 | 4 | 2 | |u http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3307766 |3 Table des matières |
| 856 | 4 | 2 | |u http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3307767&custom%5Fatt%5F2=simple%5Fviewer |3 Table des matières |
| 856 | 4 | 2 | |u http://d-nb.info/995367213/04 |3 Table des matières |
| 856 | 4 | 2 | |u http://swbplus.bsz-bw.de/bsz311263445inh.htm |3 Table des matières |
| 898 | |a BK020000 |b XK020000 |c XK020000 | ||
| 900 | 7 | |a Metadata rights reserved |2 vaud | |
| 909 | 7 | |a E43ANH-2011 |2 nebis E5 | |
| 909 | 7 | |a E43-20110406 |2 nebis EN | |
| 909 | 7 | |a E27-20101209 |2 nebis EN | |
| 912 | 7 | |a if |2 SzZuIDS BS/BE | |
| 912 | 7 | |a 095 |2 E01-20110117 | |
| 912 | 7 | |a 091 |2 E01-20110117 | |
| 912 | 7 | |a 280 |2 IDS LU | |
| 949 | |B VAUD |F bcue |b bcue |j ZMB 768 681.32 |c 810030006 | ||
| 949 | |B NEBIS |F E56 |b E56 |c E56BI |j 446.06 ECKER |s 11-185 | ||
| 949 | |B IDSLU |F LUHSW |b LUHSW |c HWFR1 |j ST 276 2009 | ||
| 949 | |B IDSBB |F B571 |b B571 |c FH |j ZUW 002.01/ 116 |x NELB5711201 | ||
| 949 | |B IDSBB |F A100 |b A100 |c 100FM |j UBH Kt 19771 |x NELA1001001 | ||
| 949 | |B IDSBB |F A150 |b A150 |c MAG |j ZBS NB 34780 | ||
| 949 | |B NEBIS |F E01 |b E01 |c MG |j T 34584 | ||
| 950 | |B VAUD |P 100 |E 1- |a Eckert |D Claudia |4 aut | ||
| 950 | |B VAUD |P 856 |E 42 |u http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3307766 |3 Table des matières | ||
| 950 | |B VAUD |P 856 |E 42 |u http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3307767&custom%5Fatt%5F2=simple%5Fviewer |3 Table des matières | ||
| 950 | |B VAUD |P 856 |E 42 |u http://d-nb.info/995367213/04 |3 Table des matières | ||
| 950 | |B VAUD |P 856 |E 42 |u http://swbplus.bsz-bw.de/bsz311263445inh.htm |3 Table des matières | ||
| 950 | |B IDSBB |P 100 |E 1- |a Eckert |D Claudia |d 1965- |0 (DE-588)113873883 | ||
| 950 | |B NEBIS |P 700 |E 1- |a Eckert |D Claudia | ||
| 950 | |B IDSLU |P 100 |E 1- |a Eckert |D Claudia |d 1965- |0 (DE-588)113873883 | ||
| 956 | 4 | |B NEBIS |C EAD50 |D EBI01 |a E01 |u https://opac.nebis.ch/objects/pdf/e01_978-3-486-58999-3_01.pdf |y Titelblatt und Inhaltsverzeichnis |x VIEW |q pdf | |
| 956 | 4 | |B NEBIS |C EAD50 |D EBI01 |a E01 |u https://opac.nebis.ch/objects/pdf/e01_978-3-486-58999-3_02.pdf |y Abstract / Autoreninformation |x VIEW |q pdf | |
| 956 | 4 | |B IDSBB |C DSV51 |D DSV01 |a A100 |u http://d-nb.info/995367213/04 |q pdf |x VIEW |y Inhaltsverzeichnis | |
| 956 | 4 | |B IDSLU |C ILU50 |D ILU01 |a LUZHB |u https://d-nb.info/995367213/04 |q pdf |x VIEW |y Inhaltsverzeichnis | |
| 986 | |a SWISSBIB |b 034627944 | ||
| 986 | |a ORANGE |b 157581497 | ||