|
|
|
|
LEADER |
02144cam a2200469 4500 |
001 |
183-727132474 |
003 |
DE-627 |
005 |
20240118153922.0 |
007 |
tu |
008 |
121010s2011 xxu||||| 00| ||eng c |
020 |
|
|
|a 1601984162
|c : ca. GBP 84.00
|9 1-60198-416-2
|
020 |
|
|
|a 9781601984166
|c : ca. GBP 84.00
|9 978-1-60198-416-6
|
035 |
|
|
|a (DE-627)727132474
|
035 |
|
|
|a (DE-599)GBV727132474
|
035 |
|
|
|a (OCoLC)930861358
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XD-US
|c XA-NL
|
084 |
|
|
|a 54.64
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Bertino, Elisa
|d 1957-
|0 (DE-588)1018830286
|0 (DE-627)69070173X
|0 (DE-576)356468623
|4 aut
|
245 |
1 |
0 |
|a Access control for databases
|b concepts and systems
|c Elisa Bertino; Gabriel Ghinita; Ashish Kamra
|
264 |
|
1 |
|a Boston, Mass. [u.a.]
|b Now
|c c 2011
|
300 |
|
|
|a IX, 152 S.
|b graph. Darst.
|c 24 cm
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
490 |
1 |
|
|a Foundations and trends in databases
|v 3,1-2
|
500 |
|
|
|a Includes bibliographical references (p. 147-152)
|
689 |
0 |
0 |
|D s
|0 (DE-588)4113276-2
|0 (DE-627)105830550
|0 (DE-576)209475145
|a Datenbanksystem
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
|
|5 (DE-627)
|
700 |
1 |
|
|a Ghinita, Gabriel
|4 oth
|
700 |
1 |
|
|a Kamra, Ashish
|4 oth
|
776 |
0 |
8 |
|i Erscheint auch als
|n Online-Ausgabe
|a Bertino, Elisa, 1957 -
|t Access control for databases
|d Boston : Now Publishers Inc., 2010
|h 1 Online-Ressource (151 Seiten)
|w (DE-627)1869723163
|
830 |
|
0 |
|a Foundations and trends in databases
|v 3,1-2
|9 301
|w (DE-627)667833773
|w (DE-576)349705593
|w (DE-600)2625938-2
|x 1931-7883
|7 ns
|
856 |
4 |
2 |
|u http://www.gbv.de/dms/tib-ub-hannover/727132474.pdf
|m V:DE-601
|m B:DE-89
|q pdf/application
|v 2014-01-06
|x Verlag
|y Inhaltsverzeichnis
|3 Inhaltsverzeichnis
|
924 |
0 |
|
|a 1329039009
|b DE-89
|9 89
|c GBV
|d c
|g RT 844(3,1/2)
|
936 |
b |
k |
|a 54.64
|j Datenbanken
|0 (DE-627)106410865
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
980 |
|
|
|a 727132474
|b 183
|c sid-183-col-kxpbbi
|
SOLR
_version_ |
1797789115248279552 |
author |
Bertino, Elisa |
author2 |
Ghinita, Gabriel, Kamra, Ashish |
author2_role |
oth, oth |
author2_variant |
g g gg, a k ak |
author_facet |
Bertino, Elisa, Ghinita, Gabriel, Kamra, Ashish |
author_role |
aut |
author_sort |
Bertino, Elisa 1957- |
author_variant |
e b eb |
building |
Library A |
collection |
sid-183-col-kxpbbi |
ctrlnum |
(DE-627)727132474, (DE-599)GBV727132474, (OCoLC)930861358 |
facet_avail |
Local |
facet_local_del330 |
Datenbanksystem, Kryptologie |
fincclass_txtF_mv |
science-computerscience |
footnote |
Includes bibliographical references (p. 147-152) |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
hierarchy_parent_id |
183-667833773 |
hierarchy_parent_title |
Foundations and trends in databases |
hierarchy_sequence |
301 |
hierarchy_top_id |
183-667833773 |
hierarchy_top_title |
Foundations and trends in databases |
id |
183-727132474 |
illustrated |
Not Illustrated |
imprint |
Boston, Mass. [u.a.], Now, c 2011 |
imprint_str_mv |
Boston, Mass. [u.a.]: Now, c 2011 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
183-727132474 |
is_hierarchy_title |
Access control for databases: concepts and systems |
isbn |
1601984162, 9781601984166 |
issn_isn_mv |
1931-7883 |
language |
English |
last_indexed |
2024-04-30T19:28:25.117Z |
marc_error |
[geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @64e01542 |
match_str |
bertino2011accesscontrolfordatabasesconceptsandsystems |
mega_collection |
K10plus Verbundkatalog |
multipart_link |
349705593 |
multipart_part |
(349705593)3,1-2 |
oclc_num |
930861358 |
physical |
IX, 152 S.; graph. Darst; 24 cm |
publishDate |
c 2011 |
publishDateSort |
2011 |
publishPlace |
Boston, Mass. [u.a.] |
publisher |
Now |
record_format |
marcfinc |
record_id |
727132474 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
series |
Foundations and trends in databases, 3,1-2 |
series2 |
Foundations and trends in databases ; 3,1-2 |
source_id |
183 |
spelling |
Bertino, Elisa 1957- (DE-588)1018830286 (DE-627)69070173X (DE-576)356468623 aut, Access control for databases concepts and systems Elisa Bertino; Gabriel Ghinita; Ashish Kamra, Boston, Mass. [u.a.] Now c 2011, IX, 152 S. graph. Darst. 24 cm, Text txt rdacontent, ohne Hilfsmittel zu benutzen n rdamedia, Band nc rdacarrier, Foundations and trends in databases 3,1-2, Includes bibliographical references (p. 147-152), s (DE-588)4113276-2 (DE-627)105830550 (DE-576)209475145 Datenbanksystem gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, (DE-627), Ghinita, Gabriel oth, Kamra, Ashish oth, Erscheint auch als Online-Ausgabe Bertino, Elisa, 1957 - Access control for databases Boston : Now Publishers Inc., 2010 1 Online-Ressource (151 Seiten) (DE-627)1869723163, Foundations and trends in databases 3,1-2 301 (DE-627)667833773 (DE-576)349705593 (DE-600)2625938-2 1931-7883 ns, http://www.gbv.de/dms/tib-ub-hannover/727132474.pdf V:DE-601 B:DE-89 pdf/application 2014-01-06 Verlag Inhaltsverzeichnis Inhaltsverzeichnis |
spellingShingle |
Bertino, Elisa, Access control for databases: concepts and systems, Foundations and trends in databases, 3,1-2, Datenbanksystem, Kryptologie |
title |
Access control for databases: concepts and systems |
title_auth |
Access control for databases concepts and systems |
title_full |
Access control for databases concepts and systems Elisa Bertino; Gabriel Ghinita; Ashish Kamra |
title_fullStr |
Access control for databases concepts and systems Elisa Bertino; Gabriel Ghinita; Ashish Kamra |
title_full_unstemmed |
Access control for databases concepts and systems Elisa Bertino; Gabriel Ghinita; Ashish Kamra |
title_in_hierarchy |
3,1-2. Access control for databases: concepts and systems (c 2011) |
title_short |
Access control for databases |
title_sort |
access control for databases concepts and systems |
title_sub |
concepts and systems |
title_unstemmed |
Access control for databases: concepts and systems |
topic |
Datenbanksystem, Kryptologie |
topic_facet |
Datenbanksystem, Kryptologie |
url |
http://www.gbv.de/dms/tib-ub-hannover/727132474.pdf |
work_keys_str_mv |
AT bertinoelisa accesscontrolfordatabasesconceptsandsystems, AT ghinitagabriel accesscontrolfordatabasesconceptsandsystems, AT kamraashish accesscontrolfordatabasesconceptsandsystems |