IT-Sicherheit
Konzepte - Verfahren - Protokolle
Gespeichert in:
Verfasser / Beitragende:
Claudia Eckert
Ort, Verlag, Jahr:
München :
Oldenbourg,
2008
Beschreibung:
925 S. : Ill.
Format:
Buch
Ausgabe:
5., überarb. Aufl.
Online Zugang:
| LEADER | cam a22 4 4500 | ||
|---|---|---|---|
| 001 | 260760730 | ||
| 003 | CHVBK | ||
| 005 | 20200928100938.0 | ||
| 008 | 130816s2008 gw ||||u000 u ger|d | ||
| 015 | |a GFR-DNB-07,N47,0029 | ||
| 020 | |a 978-3-486-58270-3 |c Gb. : ca. EUR 59.80 | ||
| 020 | |a 3-486-58270-4 |c Gb. : ca. EUR 59.80 | ||
| 035 | |a (NEBIS)005472227 | ||
| 035 | |a (IDSBB)004237165 | ||
| 035 | |a (IDSLU)000555880 | ||
| 040 | |a DDB |d SzZuIDS NEBIS ETH-BIB | ||
| 041 | 0 | |a ger | |
| 082 | 0 | |a 005.8 |2 22 | |
| 082 | 1 | |a 004 |2 15 | |
| 084 | |a ST 276 |2 rvk | ||
| 084 | |a ST 277 |2 rvk | ||
| 245 | 0 | 0 | |a IT-Sicherheit |b Konzepte - Verfahren - Protokolle |c Claudia Eckert |
| 250 | |a 5., überarb. Aufl. | ||
| 260 | |a München |b Oldenbourg |c 2008 | ||
| 300 | |a 925 S. |b Ill. | ||
| 650 | 7 | |a DATENKOMMUNIKATION (COMPUTERSYSTEME) |x ger |0 (ETHUDK)000061472 |2 ethudk | |
| 650 | 7 | |a DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) |x ger |0 (ETHUDK)000034698 |2 ethudk | |
| 650 | 7 | |a KRYPTOGRAPHIE (INFORMATIONSTHEORIE) |x ger |0 (ETHUDK)000042682 |2 ethudk | |
| 650 | 7 | |a LEHRBÜCHER (DOKUMENTENTYP) |x ger |0 (ETHUDK)000000099 |2 ethudk | |
| 650 | 7 | |a NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME) |x ger |0 (ETHUDK)000013758 |2 ethudk | |
| 650 | 7 | |a SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN) |x ger |0 (ETHUDK)000061425 |2 ethudk | |
| 650 | 7 | |a ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME) |x ger |0 (ETHUDK)000061582 |2 ethudk | |
| 650 | 7 | |a Computersicherheit |2 idsbb | |
| 650 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd | |
| 650 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd | |
| 690 | 7 | |B u |a 519.60.DAT |d Datensicherheit, Datenschutz, Computerkriminalität |2 idsuzh UK | |
| 691 | 7 | |B u |a SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN) |z ger |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME) |z ger |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a KRYPTOGRAPHIE (INFORMATIONSTHEORIE) |z ger |u 519.726,4 |2 nebis E1 | |
| 691 | 7 | |B u |a DATENKOMMUNIKATION (COMPUTERSYSTEME) |z ger |u 004*03*03*01 |2 nebis E1 | |
| 691 | 7 | |B u |a NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME) |z ger |u 004*03*03*03 |2 nebis E1 | |
| 691 | 7 | |B u |a ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME) |z ger |u 004*04*06*06*01 |2 nebis E1 | |
| 691 | 7 | |B u |a LEHRBÜCHER (DOKUMENTENTYP) |z ger |u (075) |2 nebis E1 | |
| 691 | 7 | |B u |a ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES) |z fre |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS) |z eng |u 004*01*07*04 |2 nebis E1 | |
| 691 | 7 | |B u |a SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION) |z fre |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS) |z eng |u 004*04*06*06 |2 nebis E1 | |
| 691 | 7 | |B u |a CRYPTOGRAPHY (INFORMATION THEORY) |z eng |u 519.726,4 |2 nebis E1 | |
| 691 | 7 | |B u |a CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION) |z fre |u 519.726,4 |2 nebis E1 | |
| 691 | 7 | |B u |a DATA COMMUNICATIONS (COMPUTER SYSTEMS) |z eng |u 004*03*03*01 |2 nebis E1 | |
| 691 | 7 | |B u |a TRANSMISSION DE DONNÉES (SYSTÈMES INFORMATIQUES) |z fre |u 004*03*03*01 |2 nebis E1 | |
| 691 | 7 | |B u |a NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS) |z eng |u 004*03*03*03 |2 nebis E1 | |
| 691 | 7 | |B u |a PROTOCOLES DE COMMUNICATION + PROTOCOLES DE RÉSEAUX (SYSTÈMES INFORMATIQUES) |z fre |u 004*03*03*03 |2 nebis E1 | |
| 691 | 7 | |B u |a CONTRÔLE D'ACCÈS (SYSTÈMES D'EXPLOITATION) |z fre |u 004*04*06*06*01 |2 nebis E1 | |
| 691 | 7 | |B u |a ACCESS CONTROL (OPERATING SYSTEMS) |z eng |u 004*04*06*06*01 |2 nebis E1 | |
| 691 | 7 | |B u |a TEXTBOOKS (DOCUMENT TYPE) |z eng |u (075) |2 nebis E1 | |
| 691 | 7 | |B u |a MANUELS POUR L'ENSEIGNEMENT (TYPE DE DOCUMENT) |z fre |u (075) |2 nebis E1 | |
| 691 | 7 | |B u |u ST 276 |2 idslu LR | |
| 700 | 1 | |a Eckert |D Claudia | |
| 898 | |a BK020000 |b XK020000 |c XK020000 | ||
| 909 | 7 | |a E43ANH-2009 |2 nebis E5 | |
| 909 | 7 | |a E07-20081009 |2 nebis EN | |
| 909 | 7 | |a E07-20081027 |2 nebis EN | |
| 909 | 7 | |a E27-20080307 |2 nebis EN | |
| 912 | 7 | |a E43 |2 E43-20090224 | |
| 912 | 7 | |a 095 |2 E01-20080114 | |
| 912 | 7 | |a 091 |2 E01-20080114 | |
| 912 | 7 | |a if |2 SzZuIDS BS/BE | |
| 912 | 7 | |a 280 |2 IDS LU | |
| 949 | |B NEBIS |F E07 |b E07 |c E07BI |j B 9/60-36343 | ||
| 949 | |B NEBIS |F E07 |b E07 |c E07BI |j XGR-36464 | ||
| 949 | |B IDSLU |F LUHSW |b LUHSW |c HWFR1 |j ST 276 2008 | ||
| 949 | |B IDSBB |F A348 |b A348 |c FH |j STA E 410 |x NELA3480801 / Akz.:k/2007,376 | ||
| 949 | |B IDSBB |F A100 |b A100 |c 100FM |j UBH Kt 18193 |x NELA1000802 | ||
| 949 | |B IDSBB |F B569 |b B569 |c 569MF |j BWW_ST_276 2(5) |x NELB5950712 | ||
| 949 | |B NEBIS |F E01 |b E01 |c MG |j 788244 | ||
| 950 | |B NEBIS |P 700 |E 1- |a Eckert |D Claudia | ||
| 950 | |B IDSBB |P 100 |E 1- |a Eckert |D Claudia |d 1965- |0 (DE-588)113873883 | ||
| 950 | |B IDSLU |P 100 |E 1- |a Eckert |D Claudia |d 1965- |0 (DE-588)113873883 | ||
| 956 | 4 | |B NEBIS |C EAD50 |D EBI01 |a E01 |u https://opac.nebis.ch/objects/pdf/000195417_e01_9783486582703_02.pdf |y Abstract / Autoreninformation |x VIEW |q pdf | |
| 956 | 4 | |B IDSBB |C DSV51 |D DSV01 |a A100 |u http://d-nb.info/986158410/04 |q pdf |x VIEW |y Inhaltsverzeichnis | |
| 956 | 4 | |B IDSLU |C ILU50 |D ILU01 |a LUZHB |u https://d-nb.info/986158410/04 |q pdf |x VIEW |y Inhaltsverzeichnis | |
| 986 | |a SWISSBIB |b 034627944 | ||
| 986 | |a ORANGE |b 157581497 | ||