From encryption to quantum computing the governance of information security and human rights

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: van Daalen, Ot (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Den Haag Asser Press [2025]
Berlin Springer
Schriftenreihe:Information Technology and Law Series 38
Schlagworte:
Online-Zugang:Inhaltstext
Auszug
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV049896079
003 DE-604
005 20241022
007 t|
008 241008s2025 gw |||| 00||| eng d
015 |a 24,N18  |2 dnb 
020 |a 9789462656345  |c Festeinband : circa EUR 139.09 (DE) (freier Preis), circa EUR 142.99 (AT) (freier Preis), circa CHF 153.50 (freier Preis), circa EUR 129.99  |9 978-94-6265-634-5 
020 |a 9462656347  |9 94-6265-634-7 
024 3 |a 9789462656345 
028 5 2 |a Bestellnummer: 978-94-6265-634-5 
028 5 2 |a Bestellnummer: 89501666 
035 |a (OCoLC)1466933950 
035 |a (DE-599)BVBBV049896079 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
044 |a gw  |c XA-DE 
049 |a DE-706 
084 |8 1\p  |a 340  |2 23sdnb 
100 1 |a van Daalen, Ot  |e Verfasser  |4 aut 
245 1 0 |a From encryption to quantum computing  |b the governance of information security and human rights  |c Ot van Daalen 
264 1 |a Den Haag  |b Asser Press  |c [2025] 
264 1 |a Berlin  |b Springer 
264 4 |c © 2025 
300 |a XII, 367 Seiten  |c 23.5 cm x 15.5 cm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Information Technology and Law Series  |v 38 
650 0 7 |a Recht  |0 (DE-588)4048737-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Informationstechnik  |0 (DE-588)4026926-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Quanteninformatik  |0 (DE-588)4705961-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Menschenrecht  |0 (DE-588)4074725-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Chiffrierung  |0 (DE-588)4352893-4  |2 gnd  |9 rswk-swf 
653 |a Quantum computing 
653 |a Encryption 
653 |a Human rights 
653 |a Information security 
653 |a Digital vulnerabilities 
689 0 0 |a Informationstechnik  |0 (DE-588)4026926-7  |D s 
689 0 1 |a Recht  |0 (DE-588)4048737-4  |D s 
689 0 2 |a Quanteninformatik  |0 (DE-588)4705961-8  |D s 
689 0 3 |a Chiffrierung  |0 (DE-588)4352893-4  |D s 
689 0 4 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 5 |a Menschenrecht  |0 (DE-588)4074725-6  |D s 
689 0 |5 DE-604 
710 2 |a T.M.C. Asser Press  |0 (DE-588)1065979169  |4 pbl 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-94-6265-635-2 
830 0 |a Information Technology and Law Series  |v 38  |w (DE-604)BV015263460  |9 38 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=8745e4e03cfe4781ab08d46ef33e20f9&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m X:MVB  |q text/html  |u https://link.springer.com/978-94-6265-634-5  |3 Auszug 
883 1 |8 1\p  |a vlb  |d 20240428  |q DE-101  |u https://d-nb.info/provenance/plan#vlb 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035235130 

Datensatz im Suchindex

_version_ 1820161765024989184
adam_text
any_adam_object
author van Daalen, Ot
author_facet van Daalen, Ot
author_role aut
author_sort van Daalen, Ot
author_variant d o v do dov
building Verbundindex
bvnumber BV049896079
ctrlnum (OCoLC)1466933950
(DE-599)BVBBV049896079
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV049896079</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241022</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241008s2025 gw |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">24,N18</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789462656345</subfield><subfield code="c">Festeinband : circa EUR 139.09 (DE) (freier Preis), circa EUR 142.99 (AT) (freier Preis), circa CHF 153.50 (freier Preis), circa EUR 129.99</subfield><subfield code="9">978-94-6265-634-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9462656347</subfield><subfield code="9">94-6265-634-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9789462656345</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 978-94-6265-634-5</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 89501666</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466933950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049896079</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">340</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">van Daalen, Ot</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From encryption to quantum computing</subfield><subfield code="b">the governance of information security and human rights</subfield><subfield code="c">Ot van Daalen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Den Haag</subfield><subfield code="b">Asser Press</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 367 Seiten</subfield><subfield code="c">23.5 cm x 15.5 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Information Technology and Law Series</subfield><subfield code="v">38</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Quanteninformatik</subfield><subfield code="0">(DE-588)4705961-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Menschenrecht</subfield><subfield code="0">(DE-588)4074725-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Quantum computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Human rights</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital vulnerabilities</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Quanteninformatik</subfield><subfield code="0">(DE-588)4705961-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Menschenrecht</subfield><subfield code="0">(DE-588)4074725-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">T.M.C. Asser Press</subfield><subfield code="0">(DE-588)1065979169</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-94-6265-635-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Information Technology and Law Series</subfield><subfield code="v">38</subfield><subfield code="w">(DE-604)BV015263460</subfield><subfield code="9">38</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=8745e4e03cfe4781ab08d46ef33e20f9&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">https://link.springer.com/978-94-6265-634-5</subfield><subfield code="3">Auszug</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">vlb</subfield><subfield code="d">20240428</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#vlb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035235130</subfield></datafield></record></collection>
id DE-604.BV049896079
illustrated Not Illustrated
indexdate 2025-01-02T18:12:06Z
institution BVB
institution_GND (DE-588)1065979169
isbn 9789462656345
9462656347
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035235130
oclc_num 1466933950
open_access_boolean
owner DE-706
owner_facet DE-706
physical XII, 367 Seiten 23.5 cm x 15.5 cm
publishDate 2025
publishDateSearch 2025
publishDateSort 2025
publisher Asser Press
Springer
record_format marc
series Information Technology and Law Series
series2 Information Technology and Law Series
spelling van Daalen, Ot Verfasser aut
From encryption to quantum computing the governance of information security and human rights Ot van Daalen
Den Haag Asser Press [2025]
Berlin Springer
© 2025
XII, 367 Seiten 23.5 cm x 15.5 cm
txt rdacontent
n rdamedia
nc rdacarrier
Information Technology and Law Series 38
Recht (DE-588)4048737-4 gnd rswk-swf
Informationstechnik (DE-588)4026926-7 gnd rswk-swf
Quanteninformatik (DE-588)4705961-8 gnd rswk-swf
Menschenrecht (DE-588)4074725-6 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Chiffrierung (DE-588)4352893-4 gnd rswk-swf
Quantum computing
Encryption
Human rights
Information security
Digital vulnerabilities
Informationstechnik (DE-588)4026926-7 s
Recht (DE-588)4048737-4 s
Quanteninformatik (DE-588)4705961-8 s
Chiffrierung (DE-588)4352893-4 s
Computersicherheit (DE-588)4274324-2 s
Menschenrecht (DE-588)4074725-6 s
DE-604
T.M.C. Asser Press (DE-588)1065979169 pbl
Erscheint auch als Online-Ausgabe 978-94-6265-635-2
Information Technology and Law Series 38 (DE-604)BV015263460 38
X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=8745e4e03cfe4781ab08d46ef33e20f9&prov=M&dok_var=1&dok_ext=htm Inhaltstext
X:MVB text/html https://link.springer.com/978-94-6265-634-5 Auszug
1\p vlb 20240428 DE-101 https://d-nb.info/provenance/plan#vlb
spellingShingle van Daalen, Ot
From encryption to quantum computing the governance of information security and human rights
Information Technology and Law Series
Recht (DE-588)4048737-4 gnd
Informationstechnik (DE-588)4026926-7 gnd
Quanteninformatik (DE-588)4705961-8 gnd
Menschenrecht (DE-588)4074725-6 gnd
Computersicherheit (DE-588)4274324-2 gnd
Chiffrierung (DE-588)4352893-4 gnd
subject_GND (DE-588)4048737-4
(DE-588)4026926-7
(DE-588)4705961-8
(DE-588)4074725-6
(DE-588)4274324-2
(DE-588)4352893-4
title From encryption to quantum computing the governance of information security and human rights
title_auth From encryption to quantum computing the governance of information security and human rights
title_exact_search From encryption to quantum computing the governance of information security and human rights
title_full From encryption to quantum computing the governance of information security and human rights Ot van Daalen
title_fullStr From encryption to quantum computing the governance of information security and human rights Ot van Daalen
title_full_unstemmed From encryption to quantum computing the governance of information security and human rights Ot van Daalen
title_short From encryption to quantum computing
title_sort from encryption to quantum computing the governance of information security and human rights
title_sub the governance of information security and human rights
topic Recht (DE-588)4048737-4 gnd
Informationstechnik (DE-588)4026926-7 gnd
Quanteninformatik (DE-588)4705961-8 gnd
Menschenrecht (DE-588)4074725-6 gnd
Computersicherheit (DE-588)4274324-2 gnd
Chiffrierung (DE-588)4352893-4 gnd
topic_facet Recht
Informationstechnik
Quanteninformatik
Menschenrecht
Computersicherheit
Chiffrierung
url http://deposit.dnb.de/cgi-bin/dokserv?id=8745e4e03cfe4781ab08d46ef33e20f9&prov=M&dok_var=1&dok_ext=htm
https://link.springer.com/978-94-6265-634-5
volume_link (DE-604)BV015263460
work_keys_str_mv AT vandaalenot fromencryptiontoquantumcomputingthegovernanceofinformationsecurityandhumanrights
AT tmcasserpress fromencryptiontoquantumcomputingthegovernanceofinformationsecurityandhumanrights