Botnet detection countering the largest security threat

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Lee, Wenke (HerausgeberIn)
Format: Buch
Sprache:English
Veröffentlicht: New York, NY Springer 2008
Ausgabe:1. ed.
Schriftenreihe:Advances in Information Security 36
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV039169530
003 DE-604
005 20110902
007 t|
008 110802s2008 gw ad|| |||| 00||| eng d
015 |a 06,N51,0010  |2 dnb 
020 |a 9780387687667  |c Gb. : ca. EUR 81.59 (freier Pr.), ca. sfr 129.00 (freier Pr.)  |9 978-0-387-68766-7 
020 |a 0387687661  |c Gb. : ca. EUR 81.59 (freier Pr.), ca. sfr 129.00 (freier Pr.)  |9 0-387-68766-1 
024 3 |a 9780387687667 
028 5 2 |a 11925354 
035 |a (OCoLC)600845974 
035 |a (DE-599)BVBBV039169530 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-Aug4 
082 0 |a 005.8 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a 004  |2 sdnb 
245 1 0 |a Botnet detection  |b countering the largest security threat  |c edited by Wenke Lee ... 
250 |a 1. ed. 
264 1 |a New York, NY  |b Springer  |c 2008 
300 |a XX,167 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 0 |a Advances in Information Security  |v 36 
500 |a Erscheint: Mai 2007 
650 0 7 |a Wurm  |g Informatik  |0 (DE-588)4779907-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 1 1 |a Wurm  |g Informatik  |0 (DE-588)4779907-9  |D s 
689 1 2 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 1 |8 1\p  |5 DE-604 
700 1 |a Lee, Wenke  |4 edt 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024186800 

Datensatz im Suchindex

_version_ 1819285984509952000
any_adam_object
author2 Lee, Wenke
author2_role edt
author2_variant w l wl
author_facet Lee, Wenke
building Verbundindex
bvnumber BV039169530
classification_rvk ST 277
ctrlnum (OCoLC)600845974
(DE-599)BVBBV039169530
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1. ed.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01844nam a2200517 cb4500</leader><controlfield tag="001">BV039169530</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110902 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110802s2008 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,N51,0010</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387687667</subfield><subfield code="c">Gb. : ca. EUR 81.59 (freier Pr.), ca. sfr 129.00 (freier Pr.)</subfield><subfield code="9">978-0-387-68766-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387687661</subfield><subfield code="c">Gb. : ca. EUR 81.59 (freier Pr.), ca. sfr 129.00 (freier Pr.)</subfield><subfield code="9">0-387-68766-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780387687667</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11925354</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)600845974</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039169530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Botnet detection</subfield><subfield code="b">countering the largest security threat</subfield><subfield code="c">edited by Wenke Lee ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX,167 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">36</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Erscheint: Mai 2007</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wurm</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4779907-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Wurm</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4779907-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Wenke</subfield><subfield code="4">edt</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024186800</subfield></datafield></record></collection>
id DE-604.BV039169530
illustrated Illustrated
indexdate 2024-12-24T02:11:57Z
institution BVB
isbn 9780387687667
0387687661
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024186800
oclc_num 600845974
open_access_boolean
owner DE-Aug4
owner_facet DE-Aug4
physical XX,167 S. Ill., graph. Darst.
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Springer
record_format marc
series2 Advances in Information Security
spelling Botnet detection countering the largest security threat edited by Wenke Lee ...
1. ed.
New York, NY Springer 2008
XX,167 S. Ill., graph. Darst.
txt rdacontent
n rdamedia
nc rdacarrier
Advances in Information Security 36
Erscheint: Mai 2007
Wurm Informatik (DE-588)4779907-9 gnd rswk-swf
Rechnernetz (DE-588)4070085-9 gnd rswk-swf
Eindringerkennung (DE-588)4706627-1 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 s
DE-604
Rechnernetz (DE-588)4070085-9 s
Wurm Informatik (DE-588)4779907-9 s
Eindringerkennung (DE-588)4706627-1 s
1\p DE-604
Lee, Wenke edt
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Botnet detection countering the largest security threat
Wurm Informatik (DE-588)4779907-9 gnd
Rechnernetz (DE-588)4070085-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4779907-9
(DE-588)4070085-9
(DE-588)4706627-1
(DE-588)4274324-2
title Botnet detection countering the largest security threat
title_auth Botnet detection countering the largest security threat
title_exact_search Botnet detection countering the largest security threat
title_full Botnet detection countering the largest security threat edited by Wenke Lee ...
title_fullStr Botnet detection countering the largest security threat edited by Wenke Lee ...
title_full_unstemmed Botnet detection countering the largest security threat edited by Wenke Lee ...
title_short Botnet detection
title_sort botnet detection countering the largest security threat
title_sub countering the largest security threat
topic Wurm Informatik (DE-588)4779907-9 gnd
Rechnernetz (DE-588)4070085-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Wurm Informatik
Rechnernetz
Eindringerkennung
Computersicherheit
work_keys_str_mv AT leewenke botnetdetectioncounteringthelargestsecuritythreat