Computational methods in information security : algorithms, technologies and applications

Bibliographische Detailangaben

Titel
Computational methods in information security algorithms, technologies and applications
verantwortlich
Awad, Ali Ismail (HerausgeberIn); Fairhurst, Michael C. (HerausgeberIn); Yen, Neil Y. (HerausgeberIn)
veröffentlicht
Erscheinungsjahr
2016
Medientyp
Buch
Datenquelle
British National Bibliography
Tags
Tag hinzufügen

Zugang

Weitere Informationen sehen Sie, wenn Sie angemeldet sind. Noch keinen Account? Jetzt registrieren.

LEADER 00960nam a22002898i 4500
001 180-017926288
003 Uk
005 20160712170000.0
008 160628s2016 enk 000|0|eng|d
007 tu
015 |a GBB697354  |2 bnb 
016 7 |a 017926288  |2 Uk 
020 |a 9781849199742 (hbk.) :  |c £115.00 
040 |a StDuBDS  |b eng  |c StDuBDS  |e rda 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Computational methods in information security  |b algorithms, technologies and applications  |c editors, Ali Ismail Awad, Michael Fairhurst and Neil Y. Yen 
263 |a 201606 
264 1 |a Stevenage  |b Institution of Engineering and Technology  |c 2016 
300 |a 1 volume 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
650 0 |a Computer security. 
700 1 |a Awad, Ali Ismail  |e editor. 
700 1 |a Fairhurst, Michael C.  |d 1948-  |e editor. 
700 1 |a Yen, Neil Y.  |e editor. 
980 |a 017926288  |b 180  |c sid-180-col-bnbfidbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Computational+methods+in+information+security%3A+algorithms%2C+technologies+and+applications&rft.date=2016&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Computational+methods+in+information+security%3A+algorithms%2C+technologies+and+applications&rft.au=&rft.pub=Institution+of+Engineering+and+Technology&rft.edition=&rft.isbn=1849199744
SOLR
_version_ 1778756592255107073
access_facet Local Holdings
author2 Awad, Ali Ismail, Fairhurst, Michael C., Yen, Neil Y.
author2_role edt, edt, edt
author2_variant a i a ai aia, m c f mc mcf, n y y ny nyy
author_facet Awad, Ali Ismail, Fairhurst, Michael C., Yen, Neil Y.
building Library A
callnumber-sort
collection sid-180-col-bnbfidbbi
dewey-full 005.8
dewey-hundreds 000 - Computer science, information & general works
dewey-ones 005 - Computer programming, programs & data
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, knowledge & systems
facet_avail Local
finc_class_facet Informatik
fincclass_txtF_mv science-computerscience
format Book
format_access_txtF_mv Book, E-Book
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-print-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy Book
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv Book
geogr_code not assigned
geogr_code_person not assigned
id 180-017926288
illustrated Not Illustrated
imprint Stevenage, Institution of Engineering and Technology, 2016
imprint_str_mv Stevenage Institution of Engineering and Technology 2016
institution FID-BBI-DE-23
is_hierarchy_id
is_hierarchy_title
isbn 9781849199742 (hbk.) :
isil_str_mv FID-BBI-DE-23
language English
last_indexed 2023-10-03T17:34:36.856Z
match_str awad2016computationalmethodsininformationsecurityalgorithmstechnologiesandapplications
mega_collection British National Bibliography
physical 1 volume
publishDate 2016
publishDateSort 2016
publishPlace Stevenage
publisher Institution of Engineering and Technology
record_format marcfinc
record_id 017926288
recordtype marcfinc
rvk_facet No subject assigned
source_id 180
spelling Computational methods in information security algorithms, technologies and applications editors, Ali Ismail Awad, Michael Fairhurst and Neil Y. Yen, 201606, Stevenage Institution of Engineering and Technology 2016, 1 volume, text rdacontent, unmediated rdamedia, volume rdacarrier, Computer security., Awad, Ali Ismail editor., Fairhurst, Michael C. 1948- editor., Yen, Neil Y. editor.
spellingShingle Computational methods in information security: algorithms, technologies and applications, Computer security.
title Computational methods in information security: algorithms, technologies and applications
title_auth Computational methods in information security algorithms, technologies and applications
title_full Computational methods in information security algorithms, technologies and applications editors, Ali Ismail Awad, Michael Fairhurst and Neil Y. Yen
title_fullStr Computational methods in information security algorithms, technologies and applications editors, Ali Ismail Awad, Michael Fairhurst and Neil Y. Yen
title_full_unstemmed Computational methods in information security algorithms, technologies and applications editors, Ali Ismail Awad, Michael Fairhurst and Neil Y. Yen
title_short Computational methods in information security
title_sort computational methods in information security algorithms technologies and applications
title_sub algorithms, technologies and applications
topic Computer security.
topic_facet Computer security.