Cyber Resilience System Engineering Empowered by Endogenous Security and Safety

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Wu, Jiangxing (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Singapore Springer Nature Singapore 2024
Singapore Springer
Ausgabe:1st ed. 2024
Schlagworte:
Online-Zugang:DE-522
DE-1043
DE-1046
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-1051
DE-898
DE-860
DE-1049
DE-863
DE-862
DE-523
DE-20
DE-706
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV049934857
003 DE-604
007 cr|uuu---uuuuu
008 241104s2024 xx o|||| 00||| eng d
020 |a 9789819701162  |c Online  |9 978-981-9701-16-2 
024 7 |a 10.1007/978-981-97-0116-2  |2 doi 
035 |a (ZDB-2-CWD)9789819701162 
035 |a (OCoLC)1466929430 
035 |a (DE-599)BVBBV049934857 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1050  |a DE-M347  |a DE-Aug4  |a DE-92  |a DE-898  |a DE-862  |a DE-523  |a DE-1051  |a DE-522  |a DE-20  |a DE-863  |a DE-1049  |a DE-706  |a DE-1046  |a DE-573  |a DE-860  |a DE-1043 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
100 1 |a Wu, Jiangxing  |e Verfasser  |4 aut 
245 1 0 |a Cyber Resilience System Engineering Empowered by Endogenous Security and Safety  |c by Jiangxing Wu 
250 |a 1st ed. 2024 
264 1 |a Singapore  |b Springer Nature Singapore  |c 2024 
264 1 |a Singapore  |b Springer 
300 |a 1 Online-Ressource (XXXVIII, 501 p. 185 illus., 164 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 4 |a Mobile and Network Security 
650 4 |a Principles and Models of Security 
650 4 |a Cryptology 
650 4 |a Computer networks / Security measures 
650 4 |a Computer security 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9701-15-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9701-17-9 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-981-9701-18-6 
856 4 0 |u https://doi.org/10.1007/978-981-97-0116-2  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-CWD 
940 1 |q ZDB-2-CWD_2024 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035273181 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-522  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-1043  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-1046  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-Aug4  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-1050  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-573  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-M347  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-92  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-1051  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-898  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-860  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-1049  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-863  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-862  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-523  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-20  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-981-97-0116-2  |l DE-706  |p ZDB-2-CWD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1820162360667537408
adam_text
any_adam_object
author Wu, Jiangxing
author_facet Wu, Jiangxing
author_role aut
author_sort Wu, Jiangxing
author_variant j w jw
building Verbundindex
bvnumber BV049934857
classification_tum DAT 000
collection ZDB-2-CWD
ctrlnum (ZDB-2-CWD)9789819701162
(OCoLC)1466929430
(DE-599)BVBBV049934857
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-981-97-0116-2
edition 1st ed. 2024
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049934857</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">241104s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819701162</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-9701-16-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-97-0116-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9789819701162</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466929430</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049934857</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-1043</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Jiangxing</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Resilience System Engineering Empowered by Endogenous Security and Safety</subfield><subfield code="c">by Jiangxing Wu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXXVIII, 501 p. 185 illus., 164 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Principles and Models of Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9701-15-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9701-17-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9701-18-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035273181</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-1051</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-0116-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049934857
illustrated Not Illustrated
indexdate 2025-01-02T18:21:35Z
institution BVB
isbn 9789819701162
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035273181
oclc_num 1466929430
open_access_boolean
owner DE-1050
DE-M347
DE-Aug4
DE-92
DE-898
DE-BY-UBR
DE-862
DE-BY-FWS
DE-523
DE-1051
DE-522
DE-20
DE-863
DE-BY-FWS
DE-1049
DE-706
DE-1046
DE-573
DE-860
DE-1043
owner_facet DE-1050
DE-M347
DE-Aug4
DE-92
DE-898
DE-BY-UBR
DE-862
DE-BY-FWS
DE-523
DE-1051
DE-522
DE-20
DE-863
DE-BY-FWS
DE-1049
DE-706
DE-1046
DE-573
DE-860
DE-1043
physical 1 Online-Ressource (XXXVIII, 501 p. 185 illus., 164 illus. in color)
psigel ZDB-2-CWD
ZDB-2-CWD_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Springer Nature Singapore
Springer
record_format marc
spelling Wu, Jiangxing Verfasser aut
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety by Jiangxing Wu
1st ed. 2024
Singapore Springer Nature Singapore 2024
Singapore Springer
1 Online-Ressource (XXXVIII, 501 p. 185 illus., 164 illus. in color)
txt rdacontent
c rdamedia
cr rdacarrier
Mobile and Network Security
Principles and Models of Security
Cryptology
Computer networks / Security measures
Computer security
Cryptography
Data encryption (Computer science)
Erscheint auch als Druck-Ausgabe 978-981-9701-15-5
Erscheint auch als Druck-Ausgabe 978-981-9701-17-9
Erscheint auch als Druck-Ausgabe 978-981-9701-18-6
https://doi.org/10.1007/978-981-97-0116-2 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Wu, Jiangxing
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety
Mobile and Network Security
Principles and Models of Security
Cryptology
Computer networks / Security measures
Computer security
Cryptography
Data encryption (Computer science)
title Cyber Resilience System Engineering Empowered by Endogenous Security and Safety
title_auth Cyber Resilience System Engineering Empowered by Endogenous Security and Safety
title_exact_search Cyber Resilience System Engineering Empowered by Endogenous Security and Safety
title_full Cyber Resilience System Engineering Empowered by Endogenous Security and Safety by Jiangxing Wu
title_fullStr Cyber Resilience System Engineering Empowered by Endogenous Security and Safety by Jiangxing Wu
title_full_unstemmed Cyber Resilience System Engineering Empowered by Endogenous Security and Safety by Jiangxing Wu
title_short Cyber Resilience System Engineering Empowered by Endogenous Security and Safety
title_sort cyber resilience system engineering empowered by endogenous security and safety
topic Mobile and Network Security
Principles and Models of Security
Cryptology
Computer networks / Security measures
Computer security
Cryptography
Data encryption (Computer science)
topic_facet Mobile and Network Security
Principles and Models of Security
Cryptology
Computer networks / Security measures
Computer security
Cryptography
Data encryption (Computer science)
url https://doi.org/10.1007/978-981-97-0116-2
work_keys_str_mv AT wujiangxing cyberresiliencesystemengineeringempoweredbyendogenoussecurityandsafety