|
|
|
|
LEADER |
03028cam a2200721 4500 |
001 |
183-330389890 |
003 |
DE-627 |
005 |
20221216095931.0 |
007 |
tu |
008 |
010613s2001 gw ||||| 00| ||ger c |
015 |
|
|
|a 01,A26,0671
|2 dnb
|
016 |
7 |
|
|a 961285257
|2 DE-101
|
020 |
|
|
|a 3826606825
|c kart. : DM 49.80, S 364.00
|9 3-8266-0682-5
|
035 |
|
|
|a (DE-627)330389890
|
035 |
|
|
|a (DE-576)090720520
|
035 |
|
|
|a (DE-599)GBV330389890
|
035 |
|
|
|a (OCoLC)76198743
|
035 |
|
|
|a (OCoLC)76198743
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a ger
|h eng
|
044 |
|
|
|c XA-DE
|
084 |
|
|
|a EDV 280
|2 sfb
|
084 |
|
|
|a 28
|a 19
|2 sdnb
|
084 |
|
|
|a 54.32
|2 bkl
|
084 |
|
|
|a 53.76
|2 bkl
|
100 |
1 |
|
|a Wang, Wallace
|d 1961-
|0 (DE-588)137060793
|0 (DE-627)58947295X
|0 (DE-576)167562592
|4 aut
|
240 |
1 |
0 |
|a Steal this computer book <dt.>
|
245 |
1 |
0 |
|a Steal this computer book
|c Wallace Wang. Aus dem Amerikan. von Jürgen Dubau und Ian Travis
|
250 |
|
|
|a Dt. Ausg., 1. Aufl.
|
264 |
|
1 |
|a Bonn
|b mitp
|c 2001
|
300 |
|
|
|a 448 S
|b Ill
|c 24 cm
|e 1 CD-ROM
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
689 |
0 |
0 |
|D s
|0 (DE-588)4308416-3
|0 (DE-627)123816106
|0 (DE-576)211106267
|a Internet
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4113821-1
|0 (DE-627)105826642
|0 (DE-576)209479604
|a Hacker
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4308416-3
|0 (DE-627)123816106
|0 (DE-576)211106267
|a Internet
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4214774-8
|0 (DE-627)105062359
|0 (DE-576)21022231X
|a Computervirus
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4308416-3
|0 (DE-627)123816106
|0 (DE-576)211106267
|a Internet
|2 gnd
|
689 |
2 |
1 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
2 |
2 |
|D s
|0 (DE-588)4011134-9
|0 (DE-627)106354213
|0 (DE-576)208891986
|a Datenschutz
|2 gnd
|
689 |
2 |
|
|5 DE-101
|
689 |
3 |
0 |
|D s
|0 (DE-588)4308416-3
|0 (DE-627)123816106
|0 (DE-576)211106267
|a Internet
|2 gnd
|
689 |
3 |
1 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
3 |
|
|5 DE-101
|
700 |
1 |
2 |
|a Wang, Wallace
|d 1961-
|t Steal this computer book <dt.>
|
924 |
0 |
|
|a 505855488
|b DE-Ilm1
|9 Ilm 1
|c GBV
|d c
|g INF ST 276 W246
|h 53
|
924 |
0 |
|
|a 50485786X
|b DE-705
|9 705
|c GBV
|d c
|g INF 220 SIC:YB0055
|h MB
|
924 |
0 |
|
|a 509109195
|b DE-Hil2
|9 Hil 2
|c GBV
|d c
|g CSC 220 : W05
|
924 |
0 |
|
|a 502775351
|b DE-916
|9 916
|c GBV
|d c
|g 184-9
|h SUD
|
924 |
0 |
|
|a 718479394
|b DE-552
|9 552
|c GBV
|d d
|g IN 353-97
|
924 |
0 |
|
|a 718479408
|b DE-552
|9 552
|c GBV
|d c
|g IN 353-97
|
924 |
0 |
|
|a 3203254581
|b DE-180
|9 180
|c BSZ
|d c
|g 2003 A 6449
|h WEST_UG
|
924 |
0 |
|
|a 3203254654
|b DE-90
|9 90
|c BSZ
|d c
|g 2001 A 1337
|
924 |
0 |
|
|a 3203254719
|b DE-93
|9 93
|c BSZ
|d c
|g 5H 1215
|
924 |
0 |
|
|a 4113127425
|b DE-Ka88
|9 Ka 88
|c BSZ
|d c
|g Nl 6018
|
935 |
|
|
|i Blocktest
|
936 |
b |
k |
|a 54.32
|j Rechnerkommunikation
|0 (DE-627)10640623X
|
936 |
b |
k |
|a 53.76
|j Kommunikationsdienste
|j Fernmeldetechnik
|0 (DE-627)106418076
|
951 |
|
|
|a BO
|
980 |
|
|
|a 330389890
|b 183
|c sid-183-col-kxpbbi
|
SOLR
_version_ |
1797789628683517952 |
author |
Wang, Wallace |
author2 |
Wang, Wallace |
author2_role |
|
author2_variant |
w w ww |
author_facet |
Wang, Wallace, Wang, Wallace |
author_role |
aut |
author_sort |
Wang, Wallace 1961- |
author_variant |
w w ww |
building |
Library A |
collection |
sid-183-col-kxpbbi |
ctrlnum |
(DE-627)330389890, (DE-576)090720520, (DE-599)GBV330389890, (OCoLC)76198743 |
edition |
Dt. Ausg., 1. Aufl. |
facet_avail |
Local |
facet_local_del330 |
Internet, Hacker, Computervirus, Privatsphäre, Datenschutz, Kryptologie |
fincclass_txtF_mv |
science-computerscience, engineering-electrical |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
183-330389890 |
illustrated |
Not Illustrated |
imprint |
Bonn, mitp, 2001 |
imprint_str_mv |
Bonn: mitp, 2001 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
3826606825 |
language |
German, English |
last_indexed |
2024-04-30T19:36:33.002Z |
marc_error |
[geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @64e01542 |
match_str |
wang2001stealthiscomputerbook |
mega_collection |
K10plus Verbundkatalog |
oclc_num |
76198743 |
physical |
448 S; Ill; 24 cm; 1 CD-ROM |
publishDate |
2001 |
publishDateSort |
2001 |
publishPlace |
Bonn |
publisher |
mitp |
record_format |
marcfinc |
record_id |
330389890 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
183 |
spelling |
Wang, Wallace 1961- (DE-588)137060793 (DE-627)58947295X (DE-576)167562592 aut, Steal this computer book <dt.>, Steal this computer book Wallace Wang. Aus dem Amerikan. von Jürgen Dubau und Ian Travis, Dt. Ausg., 1. Aufl., Bonn mitp 2001, 448 S Ill 24 cm 1 CD-ROM, Text txt rdacontent, ohne Hilfsmittel zu benutzen n rdamedia, Band nc rdacarrier, s (DE-588)4308416-3 (DE-627)123816106 (DE-576)211106267 Internet gnd, s (DE-588)4113821-1 (DE-627)105826642 (DE-576)209479604 Hacker gnd, DE-101, s (DE-588)4214774-8 (DE-627)105062359 (DE-576)21022231X Computervirus gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4011134-9 (DE-627)106354213 (DE-576)208891986 Datenschutz gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, Wang, Wallace 1961- Steal this computer book <dt.> |
spellingShingle |
Wang, Wallace, Steal this computer book, Internet, Hacker, Computervirus, Privatsphäre, Datenschutz, Kryptologie |
title |
Steal this computer book |
title_alt |
Steal this computer book <dt.> |
title_auth |
Steal this computer book |
title_full |
Steal this computer book Wallace Wang. Aus dem Amerikan. von Jürgen Dubau und Ian Travis |
title_fullStr |
Steal this computer book Wallace Wang. Aus dem Amerikan. von Jürgen Dubau und Ian Travis |
title_full_unstemmed |
Steal this computer book Wallace Wang. Aus dem Amerikan. von Jürgen Dubau und Ian Travis |
title_short |
Steal this computer book |
title_sort |
steal this computer book |
title_unstemmed |
Steal this computer book |
topic |
Internet, Hacker, Computervirus, Privatsphäre, Datenschutz, Kryptologie |
topic_facet |
Internet, Hacker, Computervirus, Privatsphäre, Datenschutz, Kryptologie |
work_keys_str_mv |
AT wangwallace stealthiscomputerbookdt, AT wangwallace stealthiscomputerbook |