Handbook of database security: applications and trends
Saved in:
| Other Authors: | , |
|---|---|
| Format: | Book/Monograph |
| Language: | English |
| Published: |
New York, NY
Springer
2008
|
| Volumes / Articles: | Show Volumes / Articles. |
| Subjects: | |
| Online Access: | Verlag, Inhaltstext: http://deposit.dnb.de/cgi-bin/dokserv?id=2859643&prov=M&dok_var=1&dok_ext=htm Verlag, Verlagsangaben: http://www.loc.gov/catdir/enhancements/fy0825/2007936714-d.html Verlag, Inhaltsverzeichnis: http://www.loc.gov/catdir/enhancements/fy0825/2007936714-t.html Cover: https://swbplus.bsz-bw.de/bsz258397519cov.jpg |
| Author Notes: | ed. by Michael Gertz; Sushil Jajodia |
MARC
| LEADER | 00000cam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 518641635 | ||
| 003 | DE-627 | ||
| 005 | 20241215001415.0 | ||
| 007 | tu | ||
| 008 | 061011s2008 xxu||||| 00| ||eng c | ||
| 010 | |a 2007936714 | ||
| 015 | |a 06,N43,0020 |2 dnb | ||
| 015 | |a 06,N43,0020 |2 dnb | ||
| 016 | 7 | |a 981401651 |2 DE-101 | |
| 020 | |a 0387485325 |c hbk : ca. EUR 147.50 (freier Pr.) |9 0-387-48532-5 | ||
| 020 | |a 9780387485324 |c Gb. : ca. EUR 147.50 (freier Pr.), ca. sfr 233.50 (freier Pr.) |9 978-0-387-48532-4 | ||
| 024 | 3 | |a 9780387485324 | |
| 024 | 8 | |a 11886082 |q Best.-Nr. | |
| 028 | 5 | 2 | |a 11886082 |
| 035 | |a (DE-627)518641635 | ||
| 035 | |a (DE-576)258397519 | ||
| 035 | |a (DE-599)DNB981401651 | ||
| 035 | |a (OCoLC)255264795 | ||
| 035 | |a (OCoLC)315328190 | ||
| 035 | |a (OCoLC)255264795 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
| 041 | |a eng | ||
| 044 | |c XD-US |c XA-DE-BE | ||
| 050 | 0 | |a QA76.9.D314 | |
| 072 | 7 | |a UR |2 bicssc | |
| 072 | 7 | |a UTN |2 bicssc | |
| 072 | 7 | |a COM053000 |2 bisacsh | |
| 082 | 0 | |a 005.8 |q LOC |2 22 | |
| 082 | 0 | |a 004 | |
| 082 | 0 | 4 | |a 004 |
| 084 | |a 28 |2 sdnb | ||
| 084 | |a 28 |2 sdnb | ||
| 084 | |a ST 270 |2 rvk |0 (DE-625)rvk/143638: | ||
| 084 | |a ST 277 |2 rvk |0 (DE-625)rvk/143643: | ||
| 084 | |a 54.64 |2 bkl | ||
| 084 | |a 54.38 |2 bkl | ||
| 090 | |a a | ||
| 245 | 0 | 0 | |a Handbook of database security |b applications and trends |c ed. by Michael Gertz; Sushil Jajodia |
| 264 | 1 | |a New York, NY |b Springer |c 2008 | |
| 300 | |a XIV, 577 S. |b Ill., graph. Darst. | ||
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
| 338 | |a Band |b nc |2 rdacarrier | ||
| 500 | |a Includes bibliographical references and index | ||
| 583 | 1 | |a Archivierung prüfen |c 20240324 |f DE-4165 |z 2 |2 pdager | |
| 650 | 0 | |a Database security | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 689 | 0 | 0 | |d s |0 (DE-588)4389357-0 |0 (DE-627)189844507 |0 (DE-576)211928569 |a Datenbankverwaltung |2 gnd |
| 689 | 0 | 1 | |d s |0 (DE-588)4011144-1 |0 (DE-627)106354191 |0 (DE-576)208892001 |a Datensicherung |2 gnd |
| 689 | 0 | |5 (DE-627) | |
| 700 | 1 | |a Gertz, Michael |e Hrsg. |0 (DE-588)1038076579 |0 (DE-627)756636973 |0 (DE-576)392095645 |4 edt | |
| 700 | 1 | |a Jajodia, Sushil |d 1947- |0 (DE-588)120551683 |0 (DE-627)08074284X |0 (DE-576)16575902X |4 oth | |
| 776 | 1 | |z 9780387485331 | |
| 776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Handbook of Database Security |d Boston, MA : Springer Science+Business Media, LLC, 2008 |h Online-Ressource (digital) |w (DE-627)1646405609 |w (DE-576)280575548 |z 9780387485331 |
| 856 | 4 | 2 | |u http://deposit.dnb.de/cgi-bin/dokserv?id=2859643&prov=M&dok_var=1&dok_ext=htm |q text/html |x Verlag |3 Inhaltstext |
| 856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy0825/2007936714-d.html |x Verlag |3 Verlagsangaben |
| 856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy0825/2007936714-t.html |x Verlag |3 Inhaltsverzeichnis |
| 856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz258397519cov.jpg |m V:DE-576 |m X:springer |q image/jpeg |v 20090119130816 |3 Cover |
| 935 | |i sf | ||
| 935 | |i Blocktest | ||
| 936 | r | v | |a ST 270 |b Datenbanken, Datenbanksysteme, Data base management, Informationssysteme. Allgemein |k Informatik |k Monografien |k Software und -entwicklung |k Datenbanken, Datenbanksysteme, Data base management, Informationssysteme |k Datenbanken, Datenbanksysteme, Data base management, Informationssysteme. Allgemein |0 (DE-627)1270789287 |0 (DE-625)rvk/143638: |0 (DE-576)200789287 |
| 936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Informatik |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
| 936 | b | k | |a 54.64 |j Datenbanken |0 (DE-627)106410865 |
| 936 | b | k | |a 54.38 |j Computersicherheit |0 (DE-627)106418866 |
| 951 | |a BO | ||
| 990 | |a Datensicherung | ||
| 990 | |a Datenbankverwaltung | ||
| 992 | |a 20130912 | ||
| 993 | |a Book | ||
| 994 | |a 2008 | ||
| 998 | |g 1038076579 |a Gertz, Michael |m 1038076579:Gertz, Michael |d 110000 |d 110300 |e 110000PG1038076579 |e 110300PG1038076579 |k 0/110000/ |k 1/110000/110300/ |p 1 |x j | ||
| 999 | |a KXP-PPN518641635 |e 3082266924 | ||
| BIB | |a Y | ||
| SPR | |a Y | ||
| JSO | |a {"language":["eng"],"type":{"bibl":"edited-book"},"note":["Includes bibliographical references and index"],"id":{"isbn":["0387485325","9780387485324"],"eki":["518641635"]},"title":[{"subtitle":"applications and trends","title_sort":"Handbook of database security","title":"Handbook of database security"}],"origin":[{"publisherPlace":"New York, NY","dateIssuedDisp":"2008","dateIssuedKey":"2008","publisher":"Springer"}],"name":{"displayForm":["ed. by Michael Gertz; Sushil Jajodia"]},"person":[{"family":"Gertz","role":"edt","given":"Michael","display":"Gertz, Michael"},{"given":"Sushil","role":"oth","family":"Jajodia","display":"Jajodia, Sushil"}],"physDesc":[{"extent":"XIV, 577 S.","noteIll":"Ill., graph. Darst."}],"recId":"518641635"} | ||
| SRT | |a HANDBOOKOF2008 | ||