Security in Fixed and Wireless Networks

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Schaefer, Guenter (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York John Wiley & Sons, Incorporated 2016
Ausgabe:2nd ed
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV044607962
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 171108s2016 xx o|||| 00||| eng d
020 |a 9781119040767  |9 978-1-119-04076-7 
035 |a (ZDB-30-PQE)EBC4658592 
035 |a (ZDB-89-EBL)EBL4658592 
035 |a (ZDB-38-EBR)ebr11251749 
035 |a (OCoLC)958554343 
035 |a (DE-599)BVBBV044607962 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8 
084 |a ST 200  |0 (DE-625)143611:  |2 rvk 
084 |a ST 273  |0 (DE-625)143640:  |2 rvk 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Schaefer, Guenter  |e Verfasser  |4 aut 
245 1 0 |a Security in Fixed and Wireless Networks 
250 |a 2nd ed 
264 1 |a New York  |b John Wiley & Sons, Incorporated  |c 2016 
264 4 |c © 2016 
300 |a 1 online resource (621 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Description based on publisher supplied metadata and other sources 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Mobile Telekommunikation  |0 (DE-588)4341131-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Firewall  |0 (DE-588)4386332-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheit  |0 (DE-588)4054790-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a TCP/IP  |0 (DE-588)4197538-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Drahtloses lokales Netz  |0 (DE-588)4633975-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Netzwerk  |0 (DE-588)4171529-9  |2 gnd  |9 rswk-swf 
655 7 |8 1\p  |0 (DE-588)4123623-3  |a Lehrbuch  |2 gnd-content 
689 0 0 |a Mobile Telekommunikation  |0 (DE-588)4341131-9  |D s 
689 0 1 |a TCP/IP  |0 (DE-588)4197538-8  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 3 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |8 2\p  |5 DE-604 
689 1 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 1 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 |8 3\p  |5 DE-604 
689 2 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 2 1 |a Netzwerk  |0 (DE-588)4171529-9  |D s 
689 2 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 2 |8 4\p  |5 DE-604 
689 3 0 |a Netzwerk  |0 (DE-588)4171529-9  |D s 
689 3 1 |a Sicherheit  |0 (DE-588)4054790-5  |D s 
689 3 2 |a Firewall  |0 (DE-588)4386332-2  |D s 
689 3 |8 5\p  |5 DE-604 
689 4 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 4 1 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 4 |8 6\p  |5 DE-604 
689 5 0 |a Drahtloses lokales Netz  |0 (DE-588)4633975-9  |D s 
689 5 1 |a Sicherheit  |0 (DE-588)4054790-5  |D s 
689 5 |8 7\p  |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Schaefer, Guenter  |t Security in Fixed and Wireless Networks  |d New York : John Wiley & Sons, Incorporated,c2016  |z 9781119040743 
912 |a ZDB-30-PQE 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 3\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 4\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 5\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 6\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 7\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030006309 

Datensatz im Suchindex

_version_ 1819301164486754305
any_adam_object
author Schaefer, Guenter
author_facet Schaefer, Guenter
author_role aut
author_sort Schaefer, Guenter
author_variant g s gs
building Verbundindex
bvnumber BV044607962
classification_rvk ST 200
ST 273
ST 276
ST 277
collection ZDB-30-PQE
ctrlnum (ZDB-30-PQE)EBC4658592
(ZDB-89-EBL)EBL4658592
(ZDB-38-EBR)ebr11251749
(OCoLC)958554343
(DE-599)BVBBV044607962
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 2nd ed
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03799nam a2200901zc 4500</leader><controlfield tag="001">BV044607962</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">171108s2016 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119040767</subfield><subfield code="9">978-1-119-04076-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC4658592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL4658592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr11251749</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)958554343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044607962</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schaefer, Guenter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in Fixed and Wireless Networks</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">John Wiley &amp; Sons, Incorporated</subfield><subfield code="c">2016</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (621 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobile Telekommunikation</subfield><subfield code="0">(DE-588)4341131-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">TCP/IP</subfield><subfield code="0">(DE-588)4197538-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">7\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Schaefer, Guenter</subfield><subfield code="t">Security in Fixed and Wireless Networks</subfield><subfield code="d">New York : John Wiley &amp; Sons, Incorporated,c2016</subfield><subfield code="z">9781119040743</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">7\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030006309</subfield></datafield></record></collection>
genre 1\p (DE-588)4123623-3 Lehrbuch gnd-content
genre_facet Lehrbuch
id DE-604.BV044607962
illustrated Not Illustrated
indexdate 2024-12-24T06:13:08Z
institution BVB
isbn 9781119040767
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030006309
oclc_num 958554343
open_access_boolean
physical 1 online resource (621 pages)
psigel ZDB-30-PQE
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher John Wiley & Sons, Incorporated
record_format marc
spelling Schaefer, Guenter Verfasser aut
Security in Fixed and Wireless Networks
2nd ed
New York John Wiley & Sons, Incorporated 2016
© 2016
1 online resource (621 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Description based on publisher supplied metadata and other sources
Rechnernetz (DE-588)4070085-9 gnd rswk-swf
Mobile Telekommunikation (DE-588)4341131-9 gnd rswk-swf
Eindringerkennung (DE-588)4706627-1 gnd rswk-swf
Firewall (DE-588)4386332-2 gnd rswk-swf
Sicherheit (DE-588)4054790-5 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Kryptologie (DE-588)4033329-2 gnd rswk-swf
TCP/IP (DE-588)4197538-8 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf
Netzwerk (DE-588)4171529-9 gnd rswk-swf
1\p (DE-588)4123623-3 Lehrbuch gnd-content
Mobile Telekommunikation (DE-588)4341131-9 s
TCP/IP (DE-588)4197538-8 s
Datensicherung (DE-588)4011144-1 s
Computersicherheit (DE-588)4274324-2 s
2\p DE-604
Rechnernetz (DE-588)4070085-9 s
3\p DE-604
Netzwerk (DE-588)4171529-9 s
Kryptologie (DE-588)4033329-2 s
4\p DE-604
Sicherheit (DE-588)4054790-5 s
Firewall (DE-588)4386332-2 s
5\p DE-604
Eindringerkennung (DE-588)4706627-1 s
6\p DE-604
Drahtloses lokales Netz (DE-588)4633975-9 s
7\p DE-604
Erscheint auch als Druck-Ausgabe Schaefer, Guenter Security in Fixed and Wireless Networks New York : John Wiley & Sons, Incorporated,c2016 9781119040743
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
6\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
7\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Schaefer, Guenter
Security in Fixed and Wireless Networks
Rechnernetz (DE-588)4070085-9 gnd
Mobile Telekommunikation (DE-588)4341131-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Firewall (DE-588)4386332-2 gnd
Sicherheit (DE-588)4054790-5 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptologie (DE-588)4033329-2 gnd
TCP/IP (DE-588)4197538-8 gnd
Computersicherheit (DE-588)4274324-2 gnd
Drahtloses lokales Netz (DE-588)4633975-9 gnd
Netzwerk (DE-588)4171529-9 gnd
subject_GND (DE-588)4070085-9
(DE-588)4341131-9
(DE-588)4706627-1
(DE-588)4386332-2
(DE-588)4054790-5
(DE-588)4011144-1
(DE-588)4033329-2
(DE-588)4197538-8
(DE-588)4274324-2
(DE-588)4633975-9
(DE-588)4171529-9
(DE-588)4123623-3
title Security in Fixed and Wireless Networks
title_auth Security in Fixed and Wireless Networks
title_exact_search Security in Fixed and Wireless Networks
title_full Security in Fixed and Wireless Networks
title_fullStr Security in Fixed and Wireless Networks
title_full_unstemmed Security in Fixed and Wireless Networks
title_short Security in Fixed and Wireless Networks
title_sort security in fixed and wireless networks
topic Rechnernetz (DE-588)4070085-9 gnd
Mobile Telekommunikation (DE-588)4341131-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Firewall (DE-588)4386332-2 gnd
Sicherheit (DE-588)4054790-5 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptologie (DE-588)4033329-2 gnd
TCP/IP (DE-588)4197538-8 gnd
Computersicherheit (DE-588)4274324-2 gnd
Drahtloses lokales Netz (DE-588)4633975-9 gnd
Netzwerk (DE-588)4171529-9 gnd
topic_facet Rechnernetz
Mobile Telekommunikation
Eindringerkennung
Firewall
Sicherheit
Datensicherung
Kryptologie
TCP/IP
Computersicherheit
Drahtloses lokales Netz
Netzwerk
Lehrbuch
work_keys_str_mv AT schaeferguenter securityinfixedandwirelessnetworks