Computer security

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Gollmann Dieter
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: Wiley, J.
Σειρά:Wiley, J.

MARC

LEADER 00000cam a2200000 i 4500
001 1/3024
010 |a 0-471-97844-2 
035 |l 10010601 
100 |a 20010107e20001999 0grey0105 ba 
101 0 |a eng 
200 1 |a Computer security  |f Dieter Gollmann 
210 |a Chichester  |c John Wiley  |d c1999 
215 |a xv, 320 p.  |c fig.  |d 24 cm. 
225 2 |a Worldwide Series in Computer Science 
320 |a Bibliography : p.307-313 
320 |a Includes index 
410 1 |t Worldwide Series in Computer Science  |f Wiley, J. 
606 0 |a Ασφάλεια υπολογιστών 
606 0 |a Ηλεκτρονικοί υπολογιστές  |x Προστασία αρχείων 
606 0 |a Ηλεκτρονικοί υπολογιστές  |x Ελεγχος προσπέλασης 
606 0 |a Computer security 
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.8 
700 1 |a Gollmann  |b Dieter 
709 |a Wiley, J. 
801 0 |a GR  |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2  |g AACR2 
852 |a INST  |b LIBRARY  |e 20001211  |h 005.8 GOL  |p 000026871  |q 000026871  |t BK  |y 23  |z 1 
901 |a ΦΑΣΗ 11 
909 |b 022683 
960 |a ΣΕΠΤΕΜΒΡΙΟΣ 2000 
970 |a ΜΠΑΜΠΑΗ  |b ΛΙΤΣΑ  |z 2000-10 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545241353289729
author Gollmann Dieter
author_facet Gollmann Dieter
author_role
author_sort Gollmann Dieter
author_variant g d gd
building Campus Library II
collection LIB2 Catalog
dewey-full 005.8
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000
format Book
fullrecord {"leader":"01270cam a2200337 i 4500","fields":[{"001":"1/3024"},{"010":{"subfields":[{"a":"0-471-97844-2"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10010601"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20010107e20001999 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Computer security"},{"f":"Dieter Gollmann"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"Chichester"},{"c":"John Wiley"},{"d":"c1999"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xv, 320 p."},{"c":"fig."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"225":{"subfields":[{"a":"Worldwide Series in Computer Science"}],"ind1":"2","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography : p.307-313"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"410":{"subfields":[{"t":"Worldwide Series in Computer Science"},{"f":"Wiley, J."}],"ind1":" ","ind2":"1"}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c1\u03c7\u03b5\u03af\u03c9\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0395\u03bb\u03b5\u03b3\u03c7\u03bf\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c0\u03ad\u03bb\u03b1\u03c3\u03b7\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Computer security"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Gollmann"},{"b":"Dieter"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Wiley, J."}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20001211"},{"h":"005.8 GOL"},{"p":"000026871"},{"q":"000026871"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"901":{"subfields":[{"a":"\u03a6\u0391\u03a3\u0397 11"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"022683"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a3\u0395\u03a0\u03a4\u0395\u039c\u0392\u03a1\u0399\u039f\u03a3 2000"}],"ind1":" ","ind2":" "}},{"970":{"subfields":[{"a":"\u039c\u03a0\u0391\u039c\u03a0\u0391\u0397"},{"b":"\u039b\u0399\u03a4\u03a3\u0391"},{"z":"2000-10"}],"ind1":" ","ind2":" "}}]}
id lib2_1/3024
illustrated Illustrated
institution University of West Attica
isbn 0-471-97844-2
language English
physical xv, 320 p. fig. 24 cm.
publishDate 1999
publisher Wiley, J.
record_format marc
series Wiley, J.
series2 Worldwide Series in Computer Science
spelling 20010107e20001999 0grey0105 ba
eng
Computer security Dieter Gollmann
Chichester John Wiley c1999
xv, 320 p. fig. 24 cm.
Worldwide Series in Computer Science
Bibliography : p.307-313
Includes index
Worldwide Series in Computer Science Wiley, J.
Ασφάλεια υπολογιστών
Ηλεκτρονικοί υπολογιστές Προστασία αρχείων
Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Computer security
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.8
Gollmann Dieter
Wiley, J.
GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2
INST LIBRARY 20001211 005.8 GOL 000026871 000026871 BK 23 1
spellingShingle Gollmann Dieter
Computer security
Wiley, J.
Ασφάλεια υπολογιστών
Ηλεκτρονικοί υπολογιστές Προστασία αρχείων
Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Computer security
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title Computer security
title_auth Computer security
title_full Computer security Dieter Gollmann
title_fullStr Computer security Dieter Gollmann
title_full_unstemmed Computer security Dieter Gollmann
title_short Computer security
topic Ασφάλεια υπολογιστών
Ηλεκτρονικοί υπολογιστές Προστασία αρχείων
Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Computer security
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Ασφάλεια υπολογιστών
Ηλεκτρονικοί υπολογιστές Προστασία αρχείων
Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης
Computer security