IT-Sicherheit Konzept - Verfahren - Protokolle

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Eckert, Claudia 1965- (VerfasserIn)
Format: Buch
Sprache:German
Veröffentlicht: München [u.a.] Oldenbourg 2001
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000008c 4500
001 BV013380539
003 DE-604
005 20120208
007 t
008 001002s2001 gw d||| |||| 00||| ger d
016 7 |a 959688536  |2 DE-101 
020 |a 3486252984  |9 3-486-25298-4 
035 |a (OCoLC)248634952 
035 |a (DE-599)BVBBV013380539 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a ger 
044 |a gw  |c DE 
049 |a DE-739  |a DE-29  |a DE-29T  |a DE-91  |a DE-91G  |a DE-12  |a DE-210  |a DE-473  |a DE-1047  |a DE-634  |a DE-83  |a DE-188 
050 0 |a F209 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a DAT 252f  |2 stub 
084 |a DAT 465f  |2 stub 
084 |a DAT 460f  |2 stub 
100 1 |a Eckert, Claudia  |d 1965-  |e Verfasser  |0 (DE-588)113873883  |4 aut 
245 1 0 |a IT-Sicherheit  |b Konzept - Verfahren - Protokolle  |c von Claudia Eckert 
264 1 |a München [u.a.]  |b Oldenbourg  |c 2001 
300 |a XII, 551 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
600 1 4 |a Dunning, William Archibald <1857-1922> 
650 4 |a Geschichte 
650 4 |a Southern States  |x History 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenübertragung  |0 (DE-588)4011150-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
651 4 |a Southern States  |x History 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Datenübertragung  |0 (DE-588)4011150-7  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 3 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |8 1\p  |5 DE-604 
689 1 0 |a Datenübertragung  |0 (DE-588)4011150-7  |D s 
689 1 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 2 |5 DE-604 
999 |a oai:aleph.bib-bvb.de:BVB01-009127183 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 

Datensatz im Suchindex

DE-473_call_number 649/ST 273 WX 15997a
DE-473_location 7
DE-BY-TUM_call_number 0102/DAT 460f 2006 A 4505+2
0002/DAT 460f 2000 A 1960
0104/DAT 460f 2006 A 4505
0102/DAT 460f 2006 A 4505
DE-BY-TUM_katkey 1165349
DE-BY-TUM_local_keycode ug
up
DE-BY-TUM_media_number 040020060331
040010590079
040020280575
040006471316
DE-BY-UBG_katkey 1776488
DE-BY-UBG_media_number TEMP1600094
_version_ 1816711953781882880
any_adam_object
author Eckert, Claudia 1965-
author_GND (DE-588)113873883
author_facet Eckert, Claudia 1965-
author_role aut
author_sort Eckert, Claudia 1965-
author_variant c e ce
building Verbundindex
bvnumber BV013380539
callnumber-first F - General American History
callnumber-label F209
callnumber-raw F209
callnumber-search F209
callnumber-sort F 3209
callnumber-subject F - General American History
classification_rvk ST 276
ST 277
classification_tum DAT 252f
DAT 465f
DAT 460f
ctrlnum (OCoLC)248634952
(DE-599)BVBBV013380539
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02062nam a22005778c 4500</leader><controlfield tag="001">BV013380539</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120208 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">001002s2001 gw d||| |||| 00||| ger d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">959688536</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3486252984</subfield><subfield code="9">3-486-25298-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248634952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013380539</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-210</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">F209</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Eckert, Claudia</subfield><subfield code="d">1965-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113873883</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IT-Sicherheit</subfield><subfield code="b">Konzept - Verfahren - Protokolle</subfield><subfield code="c">von Claudia Eckert</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">München [u.a.]</subfield><subfield code="b">Oldenbourg</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 551 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="600" ind1="1" ind2="4"><subfield code="a">Dunning, William Archibald &lt;1857-1922&gt;</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geschichte</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Southern States</subfield><subfield code="x">History</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Southern States</subfield><subfield code="x">History</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009127183</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection>
geographic Southern States History
geographic_facet Southern States History
id DE-604.BV013380539
illustrated Illustrated
index_date 2024-09-19T15:08:40Z
indexdate 2024-11-25T17:16:24Z
institution BVB
isbn 3486252984
language German
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-009127183
oclc_num 248634952
open_access_boolean
owner DE-739
DE-29
DE-29T
DE-91
DE-BY-TUM
DE-91G
DE-BY-TUM
DE-12
DE-210
DE-473
DE-BY-UBG
DE-1047
DE-634
DE-83
DE-188
owner_facet DE-739
DE-29
DE-29T
DE-91
DE-BY-TUM
DE-91G
DE-BY-TUM
DE-12
DE-210
DE-473
DE-BY-UBG
DE-1047
DE-634
DE-83
DE-188
physical XII, 551 S. graph. Darst.
publishDate 2001
publishDateSearch 2001
publishDateSort 2001
publisher Oldenbourg
record_format marc
spellingShingle Eckert, Claudia 1965-
IT-Sicherheit Konzept - Verfahren - Protokolle
Dunning, William Archibald <1857-1922>
Geschichte
Southern States History
Kryptologie (DE-588)4033329-2 gnd
Datenübertragung (DE-588)4011150-7 gnd
Datensicherung (DE-588)4011144-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4033329-2
(DE-588)4011150-7
(DE-588)4011144-1
(DE-588)4274324-2
title IT-Sicherheit Konzept - Verfahren - Protokolle
title_auth IT-Sicherheit Konzept - Verfahren - Protokolle
title_exact_search IT-Sicherheit Konzept - Verfahren - Protokolle
title_full IT-Sicherheit Konzept - Verfahren - Protokolle von Claudia Eckert
title_fullStr IT-Sicherheit Konzept - Verfahren - Protokolle von Claudia Eckert
title_full_unstemmed IT-Sicherheit Konzept - Verfahren - Protokolle von Claudia Eckert
title_short IT-Sicherheit
title_sort it sicherheit konzept verfahren protokolle
title_sub Konzept - Verfahren - Protokolle
topic Dunning, William Archibald <1857-1922>
Geschichte
Southern States History
Kryptologie (DE-588)4033329-2 gnd
Datenübertragung (DE-588)4011150-7 gnd
Datensicherung (DE-588)4011144-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Dunning, William Archibald <1857-1922>
Geschichte
Southern States History
Kryptologie
Datenübertragung
Datensicherung
Computersicherheit
work_keys_str_mv AT eckertclaudia itsicherheitkonzeptverfahrenprotokolle