Enterprise software security a confluence of disciplines

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Van Wyk, Kenneth R. (VerfasserIn), Graff, Mark G. (VerfasserIn), Peters, Dan S. (VerfasserIn), Burley, Diana L. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Upper Saddle River, NJ Addison-Wesley [2015]
Schriftenreihe:Software security series
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047468491
003 DE-627-1
005 20240228115720.0
007 cr uuu---uuuuu
008 191023s2015 xx |||||o 00| ||eng c
020 |a 9780321604378  |9 978-0-321-60437-8 
020 |a 0321604377  |9 0-321-60437-7 
020 |a 0321604113  |9 0-321-60411-3 
020 |a 9780321604118  |9 978-0-321-60411-8 
035 |a (DE-627-1)047468491 
035 |a (DE-599)KEP047468491 
035 |a (ORHE)9780321604378 
035 |a (DE-627-1)047468491 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23 
100 1 |a Van Wyk, Kenneth R.  |e VerfasserIn  |4 aut 
245 1 0 |a Enterprise software security  |b a confluence of disciplines  |c Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, Ph. D 
264 1 |a Upper Saddle River, NJ  |b Addison-Wesley  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume)  |b illustrations. 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Software security series 
500 |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 5, 2014) 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Sécurité informatique 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security 
700 1 |a Graff, Mark G.  |e VerfasserIn  |4 aut 
700 1 |a Peters, Dan S.  |e VerfasserIn  |4 aut 
700 1 |a Burley, Diana L.  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9780321604378/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047468491
_version_ 1818767337113780224
adam_text
any_adam_object
author Van Wyk, Kenneth R.
Graff, Mark G.
Peters, Dan S.
Burley, Diana L.
author_facet Van Wyk, Kenneth R.
Graff, Mark G.
Peters, Dan S.
Burley, Diana L.
author_role aut
aut
aut
aut
author_sort Van Wyk, Kenneth R.
author_variant w k r v wkr wkrv
m g g mg mgg
d s p ds dsp
d l b dl dlb
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047468491
(DE-599)KEP047468491
(ORHE)9780321604378
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01870cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-047468491</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115720.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321604378</subfield><subfield code="9">978-0-321-60437-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321604377</subfield><subfield code="9">0-321-60437-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321604113</subfield><subfield code="9">0-321-60411-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321604118</subfield><subfield code="9">978-0-321-60411-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047468491</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047468491</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780321604378</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047468491</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Van Wyk, Kenneth R.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise software security</subfield><subfield code="b">a confluence of disciplines</subfield><subfield code="c">Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, Ph. D</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Software security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 5, 2014)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Graff, Mark G.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peters, Dan S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burley, Diana L.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780321604378/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047468491
illustrated Illustrated
indexdate 2024-12-18T08:48:16Z
institution BVB
isbn 9780321604378
0321604377
0321604113
9780321604118
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations.
psigel ZDB-30-ORH
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Addison-Wesley
record_format marc
series2 Software security series
spelling Van Wyk, Kenneth R. VerfasserIn aut
Enterprise software security a confluence of disciplines Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, Ph. D
Upper Saddle River, NJ Addison-Wesley [2015]
©2015
1 online resource (1 volume) illustrations.
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Software security series
Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 5, 2014)
Computer networks Security measures
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Computer networks ; Security measures
Graff, Mark G. VerfasserIn aut
Peters, Dan S. VerfasserIn aut
Burley, Diana L. VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780321604378/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Van Wyk, Kenneth R.
Graff, Mark G.
Peters, Dan S.
Burley, Diana L.
Enterprise software security a confluence of disciplines
Computer networks Security measures
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Computer networks ; Security measures
title Enterprise software security a confluence of disciplines
title_auth Enterprise software security a confluence of disciplines
title_exact_search Enterprise software security a confluence of disciplines
title_full Enterprise software security a confluence of disciplines Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, Ph. D
title_fullStr Enterprise software security a confluence of disciplines Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, Ph. D
title_full_unstemmed Enterprise software security a confluence of disciplines Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, Ph. D
title_short Enterprise software security
title_sort enterprise software security a confluence of disciplines
title_sub a confluence of disciplines
topic Computer networks Security measures
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Computer networks ; Security measures
topic_facet Computer networks Security measures
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9780321604378/?ar
work_keys_str_mv AT vanwykkennethr enterprisesoftwaresecurityaconfluenceofdisciplines
AT graffmarkg enterprisesoftwaresecurityaconfluenceofdisciplines
AT petersdans enterprisesoftwaresecurityaconfluenceofdisciplines
AT burleydianal enterprisesoftwaresecurityaconfluenceofdisciplines