Cybercrime and cybersecurity

Gespeichert in:
Bibliographische Detailangaben
Format: Buch
Sprache:English
Veröffentlicht: Sofia ProCon Ltd. 2006
Schriftenreihe:Information & security 18
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV023258045
003 DE-604
005 20080506
007 t|
008 080415s2006 xx ad|| |||| 00||| eng d
035 |a (OCoLC)237247168 
035 |a (DE-599)BVBBV023258045 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-12 
050 0 |a HV6773 
245 1 0 |a Cybercrime and cybersecurity  |c ed. by Petya Ivanova 
264 1 |a Sofia  |b ProCon Ltd.  |c 2006 
300 |a 149 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Information & security  |v 18 
650 4 |a Computer crimes  |x Prevention 
650 4 |a Computer networks  |x Security measures 
650 4 |a Computer security 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerkriminalität  |0 (DE-588)4010452-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
689 0 0 |a Computerkriminalität  |0 (DE-588)4010452-7  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
700 1 |a Ivanova, Petja  |e Sonstige  |4 oth 
830 0 |a Information & security  |v 18  |w (DE-604)BV019673153  |9 18 
856 4 2 |m Digitalisierung BSBMuenchen  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016443291&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
940 1 |n oe 
943 1 |a oai:aleph.bib-bvb.de:BVB01-016443291 

Datensatz im Suchindex

_version_ 1819583433084502016
adam_text Content Editorial Securing Cyberspace 5 Xingan Li Cybcrsccurity as a Relative Concept 1 1 Dealing with Fraud Krzysztof Woda Money Laundering Techniques with Electronic Payment Systems 27 Vladimir Zaslav.sky and Anna Strizhak Credit Card Fraud Detection Using Self-Organizing Maps 48 Novel Security Protocols Jung-San Lee and Chin-Chen Chang Choosing t-out-of-n Secrets by Oblivious Transfer 67 Tran Khanh Dang Security Protocols for Outsourcing Database Services 85 Remote Authentication Tzung-Her Chen, Du-Shtau Tsai, and Gwoboa Horng Secure User-Friendly Remote Authentication Schemes 1 1 1 Chin-Chen Chang and Jung-San Lee An Efficient and Secure Remote Authentication Scheme Using Smart Cards 122 I&S Monitor Cybcrsecuriry-Related Internet Sources 137 Managing Cybersccurity Resources: A Cost-Benefit Analysis 148
any_adam_object 1
building Verbundindex
bvnumber BV023258045
callnumber-first H - Social Science
callnumber-label HV6773
callnumber-raw HV6773
callnumber-search HV6773
callnumber-sort HV 46773
callnumber-subject HV - Social Pathology, Criminology
ctrlnum (OCoLC)237247168
(DE-599)BVBBV023258045
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01540nam a2200409 cb4500</leader><controlfield tag="001">BV023258045</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080506 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080415s2006 xx ad|| |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)237247168</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023258045</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercrime and cybersecurity</subfield><subfield code="c">ed. by Petya Ivanova</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sofia</subfield><subfield code="b">ProCon Ltd.</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">149 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Information &amp; security</subfield><subfield code="v">18</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ivanova, Petja</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Information &amp; security</subfield><subfield code="v">18</subfield><subfield code="w">(DE-604)BV019673153</subfield><subfield code="9">18</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=016443291&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016443291</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV023258045
illustrated Illustrated
indexdate 2024-12-23T20:59:08Z
institution BVB
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-016443291
oclc_num 237247168
open_access_boolean
owner DE-12
owner_facet DE-12
physical 149 S. Ill., graph. Darst.
publishDate 2006
publishDateSearch 2006
publishDateSort 2006
publisher ProCon Ltd.
record_format marc
series Information & security
series2 Information & security
spellingShingle Cybercrime and cybersecurity
Information & security
Computer crimes Prevention
Computer networks Security measures
Computer security
Computersicherheit (DE-588)4274324-2 gnd
Computerkriminalität (DE-588)4010452-7 gnd
subject_GND (DE-588)4274324-2
(DE-588)4010452-7
(DE-588)4143413-4
title Cybercrime and cybersecurity
title_auth Cybercrime and cybersecurity
title_exact_search Cybercrime and cybersecurity
title_full Cybercrime and cybersecurity ed. by Petya Ivanova
title_fullStr Cybercrime and cybersecurity ed. by Petya Ivanova
title_full_unstemmed Cybercrime and cybersecurity ed. by Petya Ivanova
title_short Cybercrime and cybersecurity
title_sort cybercrime and cybersecurity
topic Computer crimes Prevention
Computer networks Security measures
Computer security
Computersicherheit (DE-588)4274324-2 gnd
Computerkriminalität (DE-588)4010452-7 gnd
topic_facet Computer crimes Prevention
Computer networks Security measures
Computer security
Computersicherheit
Computerkriminalität
Aufsatzsammlung
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016443291&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV019673153
work_keys_str_mv AT ivanovapetja cybercrimeandcybersecurity