Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rath...
Ausführliche Beschreibung
Autor*in: |
Soldatos, John [verfasserIn] Philpot, James [herausgeberIn] Giunta, Gabriele [herausgeberIn] |
---|
Format: |
E-Book |
---|---|
Sprache: |
Englisch |
Erschienen: |
Norwell, MA: Now Publishers ; 2020 |
---|
Rechteinformationen: |
Open Access Creative Commons ; https://creativecommons.org/licenses/by-nc/4.0 |
---|
Schlagwörter: |
---|
Umfang: |
1 Online-Ressource (450 p.) |
---|
Reihe: |
NowOpen |
---|
Links: | |
---|---|
ISBN: |
978-1-68083-687-5 978-1-68083-686-8 |
Katalog-ID: |
1836465793 |
---|
LEADER | 01000cam a22002652 4500 | ||
---|---|---|---|
001 | 1836465793 | ||
003 | DE-627 | ||
005 | 20241008145941.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220426s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781680836875 |9 978-1-68083-687-5 | ||
020 | |a 9781680836868 |9 978-1-68083-686-8 | ||
035 | |a (DE-627)1836465793 | ||
035 | |a (DE-599)KEP077594045 | ||
035 | |a (OCoLC)1286309223 | ||
035 | |a (OAPEN)47871 | ||
035 | |a (EBP)077594045 | ||
040 | |a DE-627 |b eng |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UT |2 bicssc | |
100 | 1 | |a Soldatos, John |e verfasserin |4 aut | |
245 | 1 | 0 | |a Cyber-Physical Threat Intelligence for Critical Infrastructures Security |b A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures |
264 | 1 | |a Norwell, MA |b Now Publishers |c 2020 | |
300 | |a 1 Online-Ressource (450 p.) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a NowOpen | |
506 | 0 | |a Open Access |f Unrestricted online access |2 star | |
520 | |a Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc/4.0 |2 cc | ||
546 | |a English | ||
650 | 4 | |a Computer networking & communications | |
650 | 4 | |a Computer networking and communications | |
700 | 1 | |a Philpot, James |e herausgeberin |4 edt | |
700 | 1 | |a Giunta, Gabriele |e herausgeberin |4 edt | |
856 | 4 | 0 | |u https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf |m X:OAPEN |x Verlag |z kostenfrei |
856 | 4 | 0 | |u https://library.oapen.org/handle/20.500.12657/47871 |m X:OAPEN |x Verlag |z kostenfrei |
912 | |a ZDB-94-OAL | ||
912 | |a GBV_ILN_22 | ||
912 | |a ISIL_DE-18 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a GBV_ILN_23 | ||
912 | |a ISIL_DE-830 | ||
912 | |a GBV_ILN_30 | ||
912 | |a ISIL_DE-104 | ||
912 | |a GBV_ILN_31 | ||
912 | |a ISIL_DE-27 | ||
912 | |a GBV_ILN_34 | ||
912 | |a ISIL_DE-18-302 | ||
912 | |a GBV_ILN_39 | ||
912 | |a ISIL_DE-547 | ||
912 | |a GBV_ILN_40 | ||
912 | |a ISIL_DE-7 | ||
912 | |a GBV_ILN_63 | ||
912 | |a ISIL_DE-Wim2 | ||
912 | |a GBV_ILN_65 | ||
912 | |a ISIL_DE-3 | ||
912 | |a GBV_ILN_70 | ||
912 | |a ISIL_DE-89 | ||
912 | |a GBV_ILN_72 | ||
912 | |a ISIL_DE-35 | ||
912 | |a GBV_ILN_95 | ||
912 | |a ISIL_DE-542 | ||
912 | |a GBV_ILN_110 | ||
912 | |a ISIL_DE-Luen4 | ||
912 | |a GBV_ILN_136 | ||
912 | |a ISIL_DE-Wis1 | ||
912 | |a GBV_ILN_147 | ||
912 | |a ISIL_DE-Fl3 | ||
912 | |a GBV_ILN_161 | ||
912 | |a ISIL_DE-960 | ||
912 | |a GBV_ILN_187 | ||
912 | |a ISIL_DE-Ki95 | ||
912 | |a GBV_ILN_213 | ||
912 | |a ISIL_DE-551 | ||
912 | |a GBV_ILN_230 | ||
912 | |a ISIL_DE-552 | ||
912 | |a GBV_ILN_283 | ||
912 | |a ISIL_DE-Ha163 | ||
912 | |a GBV_ILN_293 | ||
912 | |a ISIL_DE-960-3 | ||
912 | |a GBV_ILN_370 | ||
912 | |a ISIL_DE-1373 | ||
912 | |a GBV_ILN_603 | ||
912 | |a ISIL_DE-B1556 | ||
912 | |a GBV_ILN_808 | ||
912 | |a GBV_ILN_2403 | ||
912 | |a ISIL_DE-LFER | ||
951 | |a BO | ||
980 | |2 22 |1 01 |x 0018 |b 4280122202 |h OLR-ZDB-94-OAL |k OAPEN Library |y zu |z 01-03-23 | ||
980 | |2 23 |1 01 |x 0830 |b 4280674264 |h OLR-OAPEN |u f |y z |z 01-03-23 | ||
980 | |2 30 |1 01 |x 0104 |b 4281034900 |h GBV-OAPEN |y z |z 01-03-23 | ||
980 | |2 31 |1 01 |x 0027 |b 4280316953 |y z |z 01-03-23 | ||
980 | |2 34 |1 01 |x 3551 |b 4278872488 |h OLR-OAPEN |y zi002 |z 01-03-23 | ||
980 | |2 39 |1 01 |x 0547 |b 4281225951 |h GBV-OAPEN |y ke |z 01-03-23 | ||
980 | |2 40 |1 01 |x 0007 |b 4279940975 |h OLR-OAPEN |y xsn |z 01-03-23 | ||
980 | |2 63 |1 01 |x 3401 |b 4281607803 |h E-Books LF GBV-OAPEN |y z |z 01-03-23 | ||
980 | |2 65 |1 01 |x 0003 |b 4281857893 |h OLR-OAPEN |y z |z 01-03-23 | ||
980 | |2 70 |1 01 |x 0089 |b 4280495270 |h OLR-OAPEN-OA |k OAPEN Online Library Open Access eBook |y z |z 01-03-23 | ||
980 | |2 72 |1 01 |x 0035 |b 4278695098 |h OLR-OAPEN-OA |k OAPEN Online Library Open Access eBook |y z |z 01-03-23 | ||
980 | |2 95 |1 01 |x 3095 |b 4343221784 |h OLR-OAL |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y z |z 24-06-23 | ||
980 | |2 110 |1 01 |x 3110 |b 4281410953 |h OLR-GBV-OAPEN |k Open Access |y z |z 01-03-23 | ||
980 | |2 136 |1 01 |x 3526 |b 4279582041 |h OLR-OAPEN |y z |z 01-03-23 | ||
980 | |2 147 |1 01 |x 3528 |b 4282056355 |h OLR-OAPEN |k frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y z |z 01-03-23 | ||
980 | |2 161 |1 01 |x 0960 |b 4278128851 |h OLR-OAPEN |k OAPEN Online Library Open Access eBook |y z |z 28-02-23 | ||
980 | |2 187 |1 01 |x 3520 |b 427851364X |k JSTOR Open Access eBook |y z |z 28-02-23 | ||
980 | |2 213 |1 01 |x 0551 |b 4279227659 |h OLR-OAPEN |k OAPEN Online Library Open Access eBook |y z |z 01-03-23 | ||
980 | |2 230 |1 01 |x 0552 |b 4279404836 |h OLR-OAPEN |k OAPEN Online Library Open Access eBook |y z |z 01-03-23 | ||
980 | |2 283 |1 01 |x 3283 |b 4279763747 |h OLR-OAL |y z |z 01-03-23 | ||
980 | |2 293 |1 01 |x 3293 |b 4278307861 |h OLR-OAPEN |k OAPEN Online Library Open Access eBook |y z |z 28-02-23 | ||
980 | |2 370 |1 01 |x 4370 |b 4279050228 |h OLR-FREE |k Kostenloser Zugriff |y z |z 01-03-23 | ||
980 | |2 603 |1 01 |x 4603 |b 4277950884 |h OLR-OAPEN |k Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. |y z |z 28-02-23 | ||
980 | |2 808 |1 01 |x 4808 |b 4280853207 |h OLR-OAPEN |k OAPEN Library |y zg |z 01-03-23 | ||
980 | |2 2403 |1 01 |x DE-LFER |b 4307803361 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |y l01 |z 12-04-23 | ||
981 | |2 22 |1 01 |x 0018 |y Volltextzugang |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 23 |1 01 |x 0830 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 30 |1 01 |x 0104 |y Open Access |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 31 |1 01 |x 0027 |y eBook GBV-OAPEN |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 34 |1 01 |x 3551 |y OpenAccess |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 40 |1 01 |x 0007 |y Volltext, Open Access |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 63 |1 01 |x 3401 |y E-Book |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 65 |1 01 |x 0003 |y Open Access |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 65 |1 01 |x 0003 |y Dieser Titel ist Teil einer Datenbank |r http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal | ||
981 | |2 70 |1 01 |x 0089 |r https://library.oapen.org/handle/20.500.12657/47871 |z LF | ||
981 | |2 72 |1 01 |x 0035 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 95 |1 01 |x 3095 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 110 |1 01 |x 3110 |y Open Access |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 136 |1 01 |x 3526 |y Open Access |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 147 |1 01 |x 3528 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 161 |1 01 |x 0960 |r https://library.oapen.org/handle/20.500.12657/47871 |z LF | ||
981 | |2 187 |1 01 |x 3520 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 213 |1 01 |x 0551 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 230 |1 01 |x 0552 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 283 |1 01 |x 3283 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 293 |1 01 |x 3293 |r https://library.oapen.org/handle/20.500.12657/47871 |z LF | ||
981 | |2 370 |1 01 |x 4370 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 603 |1 01 |x 4603 |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 808 |1 01 |x 4808 |y Volltextzugang |r https://library.oapen.org/handle/20.500.12657/47871 | ||
981 | |2 2403 |1 01 |x DE-LFER |r https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf | ||
982 | |2 31 |1 01 |x 0027 |8 00 |a eBook GBV-OAPEN | ||
995 | |2 22 |1 01 |x 0018 |a OLR-ZDB-94-OAL | ||
995 | |2 23 |1 01 |x 0830 |a OLR-OAPEN | ||
995 | |2 30 |1 01 |x 0104 |a GBV-OAPEN | ||
995 | |2 34 |1 01 |x 3551 |a OLR-OAPEN | ||
995 | |2 39 |1 01 |x 0547 |a GBV-OAPEN | ||
995 | |2 39 |1 01 |x 0547 |a LF | ||
995 | |2 40 |1 01 |x 0007 |a OLR-OAPEN | ||
995 | |2 63 |1 01 |x 3401 |a E-Books LF GBV-OAPEN | ||
995 | |2 65 |1 01 |x 0003 |a OLR-OAPEN | ||
995 | |2 70 |1 01 |x 0089 |a OLR-OAPEN-OA | ||
995 | |2 72 |1 01 |x 0035 |a OLR-OAPEN-OA | ||
995 | |2 95 |1 01 |x 3095 |a OLR-OAL | ||
995 | |2 110 |1 01 |x 3110 |a OLR-GBV-OAPEN | ||
995 | |2 136 |1 01 |x 3526 |a OLR-OAPEN | ||
995 | |2 147 |1 01 |x 3528 |a OLR-OAPEN | ||
995 | |2 161 |1 01 |x 0960 |a OLR-OAPEN | ||
995 | |2 213 |1 01 |x 0551 |a OLR-OAPEN | ||
995 | |2 230 |1 01 |x 0552 |a OLR-OAPEN | ||
995 | |2 283 |1 01 |x 3283 |a OLR-OAL | ||
995 | |2 293 |1 01 |x 3293 |a OLR-OAPEN | ||
995 | |2 370 |1 01 |x 4370 |a OLR-FREE | ||
995 | |2 370 |1 01 |x 4370 |a olr-ebook GBV-OAPEN | ||
995 | |2 603 |1 01 |x 4603 |a OLR-OAPEN | ||
995 | |2 808 |1 01 |x 4808 |a OLR-OAPEN |
author_variant |
j s js |
---|---|
matchkey_str |
book:9781680836875:2020---- |
oclc_num |
1286309223 |
hierarchy_sort_str |
2020 |
publishDate |
2020 |
allfields |
9781680836875 978-1-68083-687-5 9781680836868 978-1-68083-686-8 (DE-627)1836465793 (DE-599)KEP077594045 (OCoLC)1286309223 (OAPEN)47871 (EBP)077594045 DE-627 eng DE-627 rda eng UT bicssc Soldatos, John verfasserin aut Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures Norwell, MA Now Publishers 2020 1 Online-Ressource (450 p.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier NowOpen Open Access Unrestricted online access star Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies Creative Commons https://creativecommons.org/licenses/by-nc/4.0 cc English Computer networking & communications Computer networking and communications Philpot, James herausgeberin edt Giunta, Gabriele herausgeberin edt https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf X:OAPEN Verlag kostenfrei https://library.oapen.org/handle/20.500.12657/47871 X:OAPEN Verlag kostenfrei ZDB-94-OAL GBV_ILN_22 ISIL_DE-18 SYSFLAG_1 GBV_KXP GBV_ILN_23 ISIL_DE-830 GBV_ILN_30 ISIL_DE-104 GBV_ILN_31 ISIL_DE-27 GBV_ILN_34 ISIL_DE-18-302 GBV_ILN_39 ISIL_DE-547 GBV_ILN_40 ISIL_DE-7 GBV_ILN_63 ISIL_DE-Wim2 GBV_ILN_65 ISIL_DE-3 GBV_ILN_70 ISIL_DE-89 GBV_ILN_72 ISIL_DE-35 GBV_ILN_95 ISIL_DE-542 GBV_ILN_110 ISIL_DE-Luen4 GBV_ILN_136 ISIL_DE-Wis1 GBV_ILN_147 ISIL_DE-Fl3 GBV_ILN_161 ISIL_DE-960 GBV_ILN_187 ISIL_DE-Ki95 GBV_ILN_213 ISIL_DE-551 GBV_ILN_230 ISIL_DE-552 GBV_ILN_283 ISIL_DE-Ha163 GBV_ILN_293 ISIL_DE-960-3 GBV_ILN_370 ISIL_DE-1373 GBV_ILN_603 ISIL_DE-B1556 GBV_ILN_808 GBV_ILN_2403 ISIL_DE-LFER BO 22 01 0018 4280122202 OLR-ZDB-94-OAL OAPEN Library zu 01-03-23 23 01 0830 4280674264 OLR-OAPEN f z 01-03-23 30 01 0104 4281034900 GBV-OAPEN z 01-03-23 31 01 0027 4280316953 z 01-03-23 34 01 3551 4278872488 OLR-OAPEN zi002 01-03-23 39 01 0547 4281225951 GBV-OAPEN ke 01-03-23 40 01 0007 4279940975 OLR-OAPEN xsn 01-03-23 63 01 3401 4281607803 E-Books LF GBV-OAPEN z 01-03-23 65 01 0003 4281857893 OLR-OAPEN z 01-03-23 70 01 0089 4280495270 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 72 01 0035 4278695098 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 95 01 3095 4343221784 OLR-OAL Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 24-06-23 110 01 3110 4281410953 OLR-GBV-OAPEN Open Access z 01-03-23 136 01 3526 4279582041 OLR-OAPEN z 01-03-23 147 01 3528 4282056355 OLR-OAPEN frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 01-03-23 161 01 0960 4278128851 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 187 01 3520 427851364X JSTOR Open Access eBook z 28-02-23 213 01 0551 4279227659 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 230 01 0552 4279404836 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 283 01 3283 4279763747 OLR-OAL z 01-03-23 293 01 3293 4278307861 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 370 01 4370 4279050228 OLR-FREE Kostenloser Zugriff z 01-03-23 603 01 4603 4277950884 OLR-OAPEN Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. z 28-02-23 808 01 4808 4280853207 OLR-OAPEN OAPEN Library zg 01-03-23 2403 01 DE-LFER 4307803361 00 --%%-- --%%-- n --%%-- l01 12-04-23 22 01 0018 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 23 01 0830 https://library.oapen.org/handle/20.500.12657/47871 30 01 0104 Open Access https://library.oapen.org/handle/20.500.12657/47871 31 01 0027 eBook GBV-OAPEN https://library.oapen.org/handle/20.500.12657/47871 34 01 3551 OpenAccess https://library.oapen.org/handle/20.500.12657/47871 40 01 0007 Volltext, Open Access https://library.oapen.org/handle/20.500.12657/47871 63 01 3401 E-Book https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Open Access https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Dieser Titel ist Teil einer Datenbank http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal 70 01 0089 https://library.oapen.org/handle/20.500.12657/47871 LF 72 01 0035 https://library.oapen.org/handle/20.500.12657/47871 95 01 3095 https://library.oapen.org/handle/20.500.12657/47871 110 01 3110 Open Access https://library.oapen.org/handle/20.500.12657/47871 136 01 3526 Open Access https://library.oapen.org/handle/20.500.12657/47871 147 01 3528 https://library.oapen.org/handle/20.500.12657/47871 161 01 0960 https://library.oapen.org/handle/20.500.12657/47871 LF 187 01 3520 https://library.oapen.org/handle/20.500.12657/47871 213 01 0551 https://library.oapen.org/handle/20.500.12657/47871 230 01 0552 https://library.oapen.org/handle/20.500.12657/47871 283 01 3283 https://library.oapen.org/handle/20.500.12657/47871 293 01 3293 https://library.oapen.org/handle/20.500.12657/47871 LF 370 01 4370 https://library.oapen.org/handle/20.500.12657/47871 603 01 4603 https://library.oapen.org/handle/20.500.12657/47871 808 01 4808 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 2403 01 DE-LFER https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf 31 01 0027 00 eBook GBV-OAPEN 22 01 0018 OLR-ZDB-94-OAL 23 01 0830 OLR-OAPEN 30 01 0104 GBV-OAPEN 34 01 3551 OLR-OAPEN 39 01 0547 GBV-OAPEN 39 01 0547 LF 40 01 0007 OLR-OAPEN 63 01 3401 E-Books LF GBV-OAPEN 65 01 0003 OLR-OAPEN 70 01 0089 OLR-OAPEN-OA 72 01 0035 OLR-OAPEN-OA 95 01 3095 OLR-OAL 110 01 3110 OLR-GBV-OAPEN 136 01 3526 OLR-OAPEN 147 01 3528 OLR-OAPEN 161 01 0960 OLR-OAPEN 213 01 0551 OLR-OAPEN 230 01 0552 OLR-OAPEN 283 01 3283 OLR-OAL 293 01 3293 OLR-OAPEN 370 01 4370 OLR-FREE 370 01 4370 olr-ebook GBV-OAPEN 603 01 4603 OLR-OAPEN 808 01 4808 OLR-OAPEN |
spelling |
9781680836875 978-1-68083-687-5 9781680836868 978-1-68083-686-8 (DE-627)1836465793 (DE-599)KEP077594045 (OCoLC)1286309223 (OAPEN)47871 (EBP)077594045 DE-627 eng DE-627 rda eng UT bicssc Soldatos, John verfasserin aut Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures Norwell, MA Now Publishers 2020 1 Online-Ressource (450 p.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier NowOpen Open Access Unrestricted online access star Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies Creative Commons https://creativecommons.org/licenses/by-nc/4.0 cc English Computer networking & communications Computer networking and communications Philpot, James herausgeberin edt Giunta, Gabriele herausgeberin edt https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf X:OAPEN Verlag kostenfrei https://library.oapen.org/handle/20.500.12657/47871 X:OAPEN Verlag kostenfrei ZDB-94-OAL GBV_ILN_22 ISIL_DE-18 SYSFLAG_1 GBV_KXP GBV_ILN_23 ISIL_DE-830 GBV_ILN_30 ISIL_DE-104 GBV_ILN_31 ISIL_DE-27 GBV_ILN_34 ISIL_DE-18-302 GBV_ILN_39 ISIL_DE-547 GBV_ILN_40 ISIL_DE-7 GBV_ILN_63 ISIL_DE-Wim2 GBV_ILN_65 ISIL_DE-3 GBV_ILN_70 ISIL_DE-89 GBV_ILN_72 ISIL_DE-35 GBV_ILN_95 ISIL_DE-542 GBV_ILN_110 ISIL_DE-Luen4 GBV_ILN_136 ISIL_DE-Wis1 GBV_ILN_147 ISIL_DE-Fl3 GBV_ILN_161 ISIL_DE-960 GBV_ILN_187 ISIL_DE-Ki95 GBV_ILN_213 ISIL_DE-551 GBV_ILN_230 ISIL_DE-552 GBV_ILN_283 ISIL_DE-Ha163 GBV_ILN_293 ISIL_DE-960-3 GBV_ILN_370 ISIL_DE-1373 GBV_ILN_603 ISIL_DE-B1556 GBV_ILN_808 GBV_ILN_2403 ISIL_DE-LFER BO 22 01 0018 4280122202 OLR-ZDB-94-OAL OAPEN Library zu 01-03-23 23 01 0830 4280674264 OLR-OAPEN f z 01-03-23 30 01 0104 4281034900 GBV-OAPEN z 01-03-23 31 01 0027 4280316953 z 01-03-23 34 01 3551 4278872488 OLR-OAPEN zi002 01-03-23 39 01 0547 4281225951 GBV-OAPEN ke 01-03-23 40 01 0007 4279940975 OLR-OAPEN xsn 01-03-23 63 01 3401 4281607803 E-Books LF GBV-OAPEN z 01-03-23 65 01 0003 4281857893 OLR-OAPEN z 01-03-23 70 01 0089 4280495270 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 72 01 0035 4278695098 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 95 01 3095 4343221784 OLR-OAL Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 24-06-23 110 01 3110 4281410953 OLR-GBV-OAPEN Open Access z 01-03-23 136 01 3526 4279582041 OLR-OAPEN z 01-03-23 147 01 3528 4282056355 OLR-OAPEN frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 01-03-23 161 01 0960 4278128851 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 187 01 3520 427851364X JSTOR Open Access eBook z 28-02-23 213 01 0551 4279227659 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 230 01 0552 4279404836 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 283 01 3283 4279763747 OLR-OAL z 01-03-23 293 01 3293 4278307861 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 370 01 4370 4279050228 OLR-FREE Kostenloser Zugriff z 01-03-23 603 01 4603 4277950884 OLR-OAPEN Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. z 28-02-23 808 01 4808 4280853207 OLR-OAPEN OAPEN Library zg 01-03-23 2403 01 DE-LFER 4307803361 00 --%%-- --%%-- n --%%-- l01 12-04-23 22 01 0018 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 23 01 0830 https://library.oapen.org/handle/20.500.12657/47871 30 01 0104 Open Access https://library.oapen.org/handle/20.500.12657/47871 31 01 0027 eBook GBV-OAPEN https://library.oapen.org/handle/20.500.12657/47871 34 01 3551 OpenAccess https://library.oapen.org/handle/20.500.12657/47871 40 01 0007 Volltext, Open Access https://library.oapen.org/handle/20.500.12657/47871 63 01 3401 E-Book https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Open Access https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Dieser Titel ist Teil einer Datenbank http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal 70 01 0089 https://library.oapen.org/handle/20.500.12657/47871 LF 72 01 0035 https://library.oapen.org/handle/20.500.12657/47871 95 01 3095 https://library.oapen.org/handle/20.500.12657/47871 110 01 3110 Open Access https://library.oapen.org/handle/20.500.12657/47871 136 01 3526 Open Access https://library.oapen.org/handle/20.500.12657/47871 147 01 3528 https://library.oapen.org/handle/20.500.12657/47871 161 01 0960 https://library.oapen.org/handle/20.500.12657/47871 LF 187 01 3520 https://library.oapen.org/handle/20.500.12657/47871 213 01 0551 https://library.oapen.org/handle/20.500.12657/47871 230 01 0552 https://library.oapen.org/handle/20.500.12657/47871 283 01 3283 https://library.oapen.org/handle/20.500.12657/47871 293 01 3293 https://library.oapen.org/handle/20.500.12657/47871 LF 370 01 4370 https://library.oapen.org/handle/20.500.12657/47871 603 01 4603 https://library.oapen.org/handle/20.500.12657/47871 808 01 4808 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 2403 01 DE-LFER https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf 31 01 0027 00 eBook GBV-OAPEN 22 01 0018 OLR-ZDB-94-OAL 23 01 0830 OLR-OAPEN 30 01 0104 GBV-OAPEN 34 01 3551 OLR-OAPEN 39 01 0547 GBV-OAPEN 39 01 0547 LF 40 01 0007 OLR-OAPEN 63 01 3401 E-Books LF GBV-OAPEN 65 01 0003 OLR-OAPEN 70 01 0089 OLR-OAPEN-OA 72 01 0035 OLR-OAPEN-OA 95 01 3095 OLR-OAL 110 01 3110 OLR-GBV-OAPEN 136 01 3526 OLR-OAPEN 147 01 3528 OLR-OAPEN 161 01 0960 OLR-OAPEN 213 01 0551 OLR-OAPEN 230 01 0552 OLR-OAPEN 283 01 3283 OLR-OAL 293 01 3293 OLR-OAPEN 370 01 4370 OLR-FREE 370 01 4370 olr-ebook GBV-OAPEN 603 01 4603 OLR-OAPEN 808 01 4808 OLR-OAPEN |
allfields_unstemmed |
9781680836875 978-1-68083-687-5 9781680836868 978-1-68083-686-8 (DE-627)1836465793 (DE-599)KEP077594045 (OCoLC)1286309223 (OAPEN)47871 (EBP)077594045 DE-627 eng DE-627 rda eng UT bicssc Soldatos, John verfasserin aut Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures Norwell, MA Now Publishers 2020 1 Online-Ressource (450 p.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier NowOpen Open Access Unrestricted online access star Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies Creative Commons https://creativecommons.org/licenses/by-nc/4.0 cc English Computer networking & communications Computer networking and communications Philpot, James herausgeberin edt Giunta, Gabriele herausgeberin edt https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf X:OAPEN Verlag kostenfrei https://library.oapen.org/handle/20.500.12657/47871 X:OAPEN Verlag kostenfrei ZDB-94-OAL GBV_ILN_22 ISIL_DE-18 SYSFLAG_1 GBV_KXP GBV_ILN_23 ISIL_DE-830 GBV_ILN_30 ISIL_DE-104 GBV_ILN_31 ISIL_DE-27 GBV_ILN_34 ISIL_DE-18-302 GBV_ILN_39 ISIL_DE-547 GBV_ILN_40 ISIL_DE-7 GBV_ILN_63 ISIL_DE-Wim2 GBV_ILN_65 ISIL_DE-3 GBV_ILN_70 ISIL_DE-89 GBV_ILN_72 ISIL_DE-35 GBV_ILN_95 ISIL_DE-542 GBV_ILN_110 ISIL_DE-Luen4 GBV_ILN_136 ISIL_DE-Wis1 GBV_ILN_147 ISIL_DE-Fl3 GBV_ILN_161 ISIL_DE-960 GBV_ILN_187 ISIL_DE-Ki95 GBV_ILN_213 ISIL_DE-551 GBV_ILN_230 ISIL_DE-552 GBV_ILN_283 ISIL_DE-Ha163 GBV_ILN_293 ISIL_DE-960-3 GBV_ILN_370 ISIL_DE-1373 GBV_ILN_603 ISIL_DE-B1556 GBV_ILN_808 GBV_ILN_2403 ISIL_DE-LFER BO 22 01 0018 4280122202 OLR-ZDB-94-OAL OAPEN Library zu 01-03-23 23 01 0830 4280674264 OLR-OAPEN f z 01-03-23 30 01 0104 4281034900 GBV-OAPEN z 01-03-23 31 01 0027 4280316953 z 01-03-23 34 01 3551 4278872488 OLR-OAPEN zi002 01-03-23 39 01 0547 4281225951 GBV-OAPEN ke 01-03-23 40 01 0007 4279940975 OLR-OAPEN xsn 01-03-23 63 01 3401 4281607803 E-Books LF GBV-OAPEN z 01-03-23 65 01 0003 4281857893 OLR-OAPEN z 01-03-23 70 01 0089 4280495270 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 72 01 0035 4278695098 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 95 01 3095 4343221784 OLR-OAL Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 24-06-23 110 01 3110 4281410953 OLR-GBV-OAPEN Open Access z 01-03-23 136 01 3526 4279582041 OLR-OAPEN z 01-03-23 147 01 3528 4282056355 OLR-OAPEN frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 01-03-23 161 01 0960 4278128851 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 187 01 3520 427851364X JSTOR Open Access eBook z 28-02-23 213 01 0551 4279227659 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 230 01 0552 4279404836 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 283 01 3283 4279763747 OLR-OAL z 01-03-23 293 01 3293 4278307861 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 370 01 4370 4279050228 OLR-FREE Kostenloser Zugriff z 01-03-23 603 01 4603 4277950884 OLR-OAPEN Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. z 28-02-23 808 01 4808 4280853207 OLR-OAPEN OAPEN Library zg 01-03-23 2403 01 DE-LFER 4307803361 00 --%%-- --%%-- n --%%-- l01 12-04-23 22 01 0018 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 23 01 0830 https://library.oapen.org/handle/20.500.12657/47871 30 01 0104 Open Access https://library.oapen.org/handle/20.500.12657/47871 31 01 0027 eBook GBV-OAPEN https://library.oapen.org/handle/20.500.12657/47871 34 01 3551 OpenAccess https://library.oapen.org/handle/20.500.12657/47871 40 01 0007 Volltext, Open Access https://library.oapen.org/handle/20.500.12657/47871 63 01 3401 E-Book https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Open Access https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Dieser Titel ist Teil einer Datenbank http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal 70 01 0089 https://library.oapen.org/handle/20.500.12657/47871 LF 72 01 0035 https://library.oapen.org/handle/20.500.12657/47871 95 01 3095 https://library.oapen.org/handle/20.500.12657/47871 110 01 3110 Open Access https://library.oapen.org/handle/20.500.12657/47871 136 01 3526 Open Access https://library.oapen.org/handle/20.500.12657/47871 147 01 3528 https://library.oapen.org/handle/20.500.12657/47871 161 01 0960 https://library.oapen.org/handle/20.500.12657/47871 LF 187 01 3520 https://library.oapen.org/handle/20.500.12657/47871 213 01 0551 https://library.oapen.org/handle/20.500.12657/47871 230 01 0552 https://library.oapen.org/handle/20.500.12657/47871 283 01 3283 https://library.oapen.org/handle/20.500.12657/47871 293 01 3293 https://library.oapen.org/handle/20.500.12657/47871 LF 370 01 4370 https://library.oapen.org/handle/20.500.12657/47871 603 01 4603 https://library.oapen.org/handle/20.500.12657/47871 808 01 4808 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 2403 01 DE-LFER https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf 31 01 0027 00 eBook GBV-OAPEN 22 01 0018 OLR-ZDB-94-OAL 23 01 0830 OLR-OAPEN 30 01 0104 GBV-OAPEN 34 01 3551 OLR-OAPEN 39 01 0547 GBV-OAPEN 39 01 0547 LF 40 01 0007 OLR-OAPEN 63 01 3401 E-Books LF GBV-OAPEN 65 01 0003 OLR-OAPEN 70 01 0089 OLR-OAPEN-OA 72 01 0035 OLR-OAPEN-OA 95 01 3095 OLR-OAL 110 01 3110 OLR-GBV-OAPEN 136 01 3526 OLR-OAPEN 147 01 3528 OLR-OAPEN 161 01 0960 OLR-OAPEN 213 01 0551 OLR-OAPEN 230 01 0552 OLR-OAPEN 283 01 3283 OLR-OAL 293 01 3293 OLR-OAPEN 370 01 4370 OLR-FREE 370 01 4370 olr-ebook GBV-OAPEN 603 01 4603 OLR-OAPEN 808 01 4808 OLR-OAPEN |
allfieldsGer |
9781680836875 978-1-68083-687-5 9781680836868 978-1-68083-686-8 (DE-627)1836465793 (DE-599)KEP077594045 (OCoLC)1286309223 (OAPEN)47871 (EBP)077594045 DE-627 eng DE-627 rda eng UT bicssc Soldatos, John verfasserin aut Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures Norwell, MA Now Publishers 2020 1 Online-Ressource (450 p.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier NowOpen Open Access Unrestricted online access star Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies Creative Commons https://creativecommons.org/licenses/by-nc/4.0 cc English Computer networking & communications Computer networking and communications Philpot, James herausgeberin edt Giunta, Gabriele herausgeberin edt https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf X:OAPEN Verlag kostenfrei https://library.oapen.org/handle/20.500.12657/47871 X:OAPEN Verlag kostenfrei ZDB-94-OAL GBV_ILN_22 ISIL_DE-18 SYSFLAG_1 GBV_KXP GBV_ILN_23 ISIL_DE-830 GBV_ILN_30 ISIL_DE-104 GBV_ILN_31 ISIL_DE-27 GBV_ILN_34 ISIL_DE-18-302 GBV_ILN_39 ISIL_DE-547 GBV_ILN_40 ISIL_DE-7 GBV_ILN_63 ISIL_DE-Wim2 GBV_ILN_65 ISIL_DE-3 GBV_ILN_70 ISIL_DE-89 GBV_ILN_72 ISIL_DE-35 GBV_ILN_95 ISIL_DE-542 GBV_ILN_110 ISIL_DE-Luen4 GBV_ILN_136 ISIL_DE-Wis1 GBV_ILN_147 ISIL_DE-Fl3 GBV_ILN_161 ISIL_DE-960 GBV_ILN_187 ISIL_DE-Ki95 GBV_ILN_213 ISIL_DE-551 GBV_ILN_230 ISIL_DE-552 GBV_ILN_283 ISIL_DE-Ha163 GBV_ILN_293 ISIL_DE-960-3 GBV_ILN_370 ISIL_DE-1373 GBV_ILN_603 ISIL_DE-B1556 GBV_ILN_808 GBV_ILN_2403 ISIL_DE-LFER BO 22 01 0018 4280122202 OLR-ZDB-94-OAL OAPEN Library zu 01-03-23 23 01 0830 4280674264 OLR-OAPEN f z 01-03-23 30 01 0104 4281034900 GBV-OAPEN z 01-03-23 31 01 0027 4280316953 z 01-03-23 34 01 3551 4278872488 OLR-OAPEN zi002 01-03-23 39 01 0547 4281225951 GBV-OAPEN ke 01-03-23 40 01 0007 4279940975 OLR-OAPEN xsn 01-03-23 63 01 3401 4281607803 E-Books LF GBV-OAPEN z 01-03-23 65 01 0003 4281857893 OLR-OAPEN z 01-03-23 70 01 0089 4280495270 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 72 01 0035 4278695098 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 95 01 3095 4343221784 OLR-OAL Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 24-06-23 110 01 3110 4281410953 OLR-GBV-OAPEN Open Access z 01-03-23 136 01 3526 4279582041 OLR-OAPEN z 01-03-23 147 01 3528 4282056355 OLR-OAPEN frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 01-03-23 161 01 0960 4278128851 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 187 01 3520 427851364X JSTOR Open Access eBook z 28-02-23 213 01 0551 4279227659 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 230 01 0552 4279404836 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 283 01 3283 4279763747 OLR-OAL z 01-03-23 293 01 3293 4278307861 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 370 01 4370 4279050228 OLR-FREE Kostenloser Zugriff z 01-03-23 603 01 4603 4277950884 OLR-OAPEN Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. z 28-02-23 808 01 4808 4280853207 OLR-OAPEN OAPEN Library zg 01-03-23 2403 01 DE-LFER 4307803361 00 --%%-- --%%-- n --%%-- l01 12-04-23 22 01 0018 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 23 01 0830 https://library.oapen.org/handle/20.500.12657/47871 30 01 0104 Open Access https://library.oapen.org/handle/20.500.12657/47871 31 01 0027 eBook GBV-OAPEN https://library.oapen.org/handle/20.500.12657/47871 34 01 3551 OpenAccess https://library.oapen.org/handle/20.500.12657/47871 40 01 0007 Volltext, Open Access https://library.oapen.org/handle/20.500.12657/47871 63 01 3401 E-Book https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Open Access https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Dieser Titel ist Teil einer Datenbank http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal 70 01 0089 https://library.oapen.org/handle/20.500.12657/47871 LF 72 01 0035 https://library.oapen.org/handle/20.500.12657/47871 95 01 3095 https://library.oapen.org/handle/20.500.12657/47871 110 01 3110 Open Access https://library.oapen.org/handle/20.500.12657/47871 136 01 3526 Open Access https://library.oapen.org/handle/20.500.12657/47871 147 01 3528 https://library.oapen.org/handle/20.500.12657/47871 161 01 0960 https://library.oapen.org/handle/20.500.12657/47871 LF 187 01 3520 https://library.oapen.org/handle/20.500.12657/47871 213 01 0551 https://library.oapen.org/handle/20.500.12657/47871 230 01 0552 https://library.oapen.org/handle/20.500.12657/47871 283 01 3283 https://library.oapen.org/handle/20.500.12657/47871 293 01 3293 https://library.oapen.org/handle/20.500.12657/47871 LF 370 01 4370 https://library.oapen.org/handle/20.500.12657/47871 603 01 4603 https://library.oapen.org/handle/20.500.12657/47871 808 01 4808 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 2403 01 DE-LFER https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf 31 01 0027 00 eBook GBV-OAPEN 22 01 0018 OLR-ZDB-94-OAL 23 01 0830 OLR-OAPEN 30 01 0104 GBV-OAPEN 34 01 3551 OLR-OAPEN 39 01 0547 GBV-OAPEN 39 01 0547 LF 40 01 0007 OLR-OAPEN 63 01 3401 E-Books LF GBV-OAPEN 65 01 0003 OLR-OAPEN 70 01 0089 OLR-OAPEN-OA 72 01 0035 OLR-OAPEN-OA 95 01 3095 OLR-OAL 110 01 3110 OLR-GBV-OAPEN 136 01 3526 OLR-OAPEN 147 01 3528 OLR-OAPEN 161 01 0960 OLR-OAPEN 213 01 0551 OLR-OAPEN 230 01 0552 OLR-OAPEN 283 01 3283 OLR-OAL 293 01 3293 OLR-OAPEN 370 01 4370 OLR-FREE 370 01 4370 olr-ebook GBV-OAPEN 603 01 4603 OLR-OAPEN 808 01 4808 OLR-OAPEN |
allfieldsSound |
9781680836875 978-1-68083-687-5 9781680836868 978-1-68083-686-8 (DE-627)1836465793 (DE-599)KEP077594045 (OCoLC)1286309223 (OAPEN)47871 (EBP)077594045 DE-627 eng DE-627 rda eng UT bicssc Soldatos, John verfasserin aut Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures Norwell, MA Now Publishers 2020 1 Online-Ressource (450 p.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier NowOpen Open Access Unrestricted online access star Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies Creative Commons https://creativecommons.org/licenses/by-nc/4.0 cc English Computer networking & communications Computer networking and communications Philpot, James herausgeberin edt Giunta, Gabriele herausgeberin edt https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf X:OAPEN Verlag kostenfrei https://library.oapen.org/handle/20.500.12657/47871 X:OAPEN Verlag kostenfrei ZDB-94-OAL GBV_ILN_22 ISIL_DE-18 SYSFLAG_1 GBV_KXP GBV_ILN_23 ISIL_DE-830 GBV_ILN_30 ISIL_DE-104 GBV_ILN_31 ISIL_DE-27 GBV_ILN_34 ISIL_DE-18-302 GBV_ILN_39 ISIL_DE-547 GBV_ILN_40 ISIL_DE-7 GBV_ILN_63 ISIL_DE-Wim2 GBV_ILN_65 ISIL_DE-3 GBV_ILN_70 ISIL_DE-89 GBV_ILN_72 ISIL_DE-35 GBV_ILN_95 ISIL_DE-542 GBV_ILN_110 ISIL_DE-Luen4 GBV_ILN_136 ISIL_DE-Wis1 GBV_ILN_147 ISIL_DE-Fl3 GBV_ILN_161 ISIL_DE-960 GBV_ILN_187 ISIL_DE-Ki95 GBV_ILN_213 ISIL_DE-551 GBV_ILN_230 ISIL_DE-552 GBV_ILN_283 ISIL_DE-Ha163 GBV_ILN_293 ISIL_DE-960-3 GBV_ILN_370 ISIL_DE-1373 GBV_ILN_603 ISIL_DE-B1556 GBV_ILN_808 GBV_ILN_2403 ISIL_DE-LFER BO 22 01 0018 4280122202 OLR-ZDB-94-OAL OAPEN Library zu 01-03-23 23 01 0830 4280674264 OLR-OAPEN f z 01-03-23 30 01 0104 4281034900 GBV-OAPEN z 01-03-23 31 01 0027 4280316953 z 01-03-23 34 01 3551 4278872488 OLR-OAPEN zi002 01-03-23 39 01 0547 4281225951 GBV-OAPEN ke 01-03-23 40 01 0007 4279940975 OLR-OAPEN xsn 01-03-23 63 01 3401 4281607803 E-Books LF GBV-OAPEN z 01-03-23 65 01 0003 4281857893 OLR-OAPEN z 01-03-23 70 01 0089 4280495270 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 72 01 0035 4278695098 OLR-OAPEN-OA OAPEN Online Library Open Access eBook z 01-03-23 95 01 3095 4343221784 OLR-OAL Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 24-06-23 110 01 3110 4281410953 OLR-GBV-OAPEN Open Access z 01-03-23 136 01 3526 4279582041 OLR-OAPEN z 01-03-23 147 01 3528 4282056355 OLR-OAPEN frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. z 01-03-23 161 01 0960 4278128851 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 187 01 3520 427851364X JSTOR Open Access eBook z 28-02-23 213 01 0551 4279227659 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 230 01 0552 4279404836 OLR-OAPEN OAPEN Online Library Open Access eBook z 01-03-23 283 01 3283 4279763747 OLR-OAL z 01-03-23 293 01 3293 4278307861 OLR-OAPEN OAPEN Online Library Open Access eBook z 28-02-23 370 01 4370 4279050228 OLR-FREE Kostenloser Zugriff z 01-03-23 603 01 4603 4277950884 OLR-OAPEN Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. z 28-02-23 808 01 4808 4280853207 OLR-OAPEN OAPEN Library zg 01-03-23 2403 01 DE-LFER 4307803361 00 --%%-- --%%-- n --%%-- l01 12-04-23 22 01 0018 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 23 01 0830 https://library.oapen.org/handle/20.500.12657/47871 30 01 0104 Open Access https://library.oapen.org/handle/20.500.12657/47871 31 01 0027 eBook GBV-OAPEN https://library.oapen.org/handle/20.500.12657/47871 34 01 3551 OpenAccess https://library.oapen.org/handle/20.500.12657/47871 40 01 0007 Volltext, Open Access https://library.oapen.org/handle/20.500.12657/47871 63 01 3401 E-Book https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Open Access https://library.oapen.org/handle/20.500.12657/47871 65 01 0003 Dieser Titel ist Teil einer Datenbank http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal 70 01 0089 https://library.oapen.org/handle/20.500.12657/47871 LF 72 01 0035 https://library.oapen.org/handle/20.500.12657/47871 95 01 3095 https://library.oapen.org/handle/20.500.12657/47871 110 01 3110 Open Access https://library.oapen.org/handle/20.500.12657/47871 136 01 3526 Open Access https://library.oapen.org/handle/20.500.12657/47871 147 01 3528 https://library.oapen.org/handle/20.500.12657/47871 161 01 0960 https://library.oapen.org/handle/20.500.12657/47871 LF 187 01 3520 https://library.oapen.org/handle/20.500.12657/47871 213 01 0551 https://library.oapen.org/handle/20.500.12657/47871 230 01 0552 https://library.oapen.org/handle/20.500.12657/47871 283 01 3283 https://library.oapen.org/handle/20.500.12657/47871 293 01 3293 https://library.oapen.org/handle/20.500.12657/47871 LF 370 01 4370 https://library.oapen.org/handle/20.500.12657/47871 603 01 4603 https://library.oapen.org/handle/20.500.12657/47871 808 01 4808 Volltextzugang https://library.oapen.org/handle/20.500.12657/47871 2403 01 DE-LFER https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf 31 01 0027 00 eBook GBV-OAPEN 22 01 0018 OLR-ZDB-94-OAL 23 01 0830 OLR-OAPEN 30 01 0104 GBV-OAPEN 34 01 3551 OLR-OAPEN 39 01 0547 GBV-OAPEN 39 01 0547 LF 40 01 0007 OLR-OAPEN 63 01 3401 E-Books LF GBV-OAPEN 65 01 0003 OLR-OAPEN 70 01 0089 OLR-OAPEN-OA 72 01 0035 OLR-OAPEN-OA 95 01 3095 OLR-OAL 110 01 3110 OLR-GBV-OAPEN 136 01 3526 OLR-OAPEN 147 01 3528 OLR-OAPEN 161 01 0960 OLR-OAPEN 213 01 0551 OLR-OAPEN 230 01 0552 OLR-OAPEN 283 01 3283 OLR-OAL 293 01 3293 OLR-OAPEN 370 01 4370 OLR-FREE 370 01 4370 olr-ebook GBV-OAPEN 603 01 4603 OLR-OAPEN 808 01 4808 OLR-OAPEN |
language |
English |
format_phy_str_mv |
Book |
building |
22:u 23 30 31 34:i 39:e 40:s 63 65 70 72 95 110 136 147 161 187 213 230 283 293 370 603 808:g 2403:0 |
institution |
findex.gbv.de |
selectbib_iln_str_mv |
22@u 23@ 30@ 31@ 34@i002 39@e 40@sn 63@ 65@ 70@ 72@ 95@ 110@ 136@ 147@ 161@ 187@ 213@ 230@ 283@ 293@ 370@ 603@ 808@g 2403@01 |
topic_facet |
Computer networking & communications Computer networking and communications |
sw_local_iln_str_mv |
31:eBook GBV-OAPEN 0027:eBook GBV-OAPEN |
isfreeaccess_bool |
true |
authorswithroles_txt_mv |
Soldatos, John @@aut@@ Philpot, James @@edt@@ Giunta, Gabriele @@edt@@ |
publishDateDaySort_date |
2020-01-01T00:00:00Z |
id |
1836465793 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000cam a22002652 4500</leader><controlfield tag="001">1836465793</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20241008145941.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220426s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680836875</subfield><subfield code="9">978-1-68083-687-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680836868</subfield><subfield code="9">978-1-68083-686-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)1836465793</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077594045</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286309223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OAPEN)47871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBP)077594045</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">eng</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UT</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soldatos, John</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security</subfield><subfield code="b">A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwell, MA</subfield><subfield code="b">Now Publishers</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (450 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NowOpen</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Creative Commons</subfield><subfield code="f">https://creativecommons.org/licenses/by-nc/4.0</subfield><subfield code="2">cc</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networking & communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networking and communications</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Philpot, James</subfield><subfield code="e">herausgeberin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Giunta, Gabriele</subfield><subfield code="e">herausgeberin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf</subfield><subfield code="m">X:OAPEN</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="m">X:OAPEN</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-94-OAL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-18</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-830</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_30</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-104</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-27</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_34</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-18-302</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-547</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-7</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Wim2</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-89</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_72</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-35</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-542</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Luen4</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_136</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Wis1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Fl3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-960</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Ki95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-551</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-552</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_283</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Ha163</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-960-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-1373</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_603</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-B1556</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_808</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2403</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-LFER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">22</subfield><subfield code="1">01</subfield><subfield code="x">0018</subfield><subfield code="b">4280122202</subfield><subfield code="h">OLR-ZDB-94-OAL</subfield><subfield code="k">OAPEN Library</subfield><subfield code="y">zu</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">23</subfield><subfield code="1">01</subfield><subfield code="x">0830</subfield><subfield code="b">4280674264</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="u">f</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">30</subfield><subfield code="1">01</subfield><subfield code="x">0104</subfield><subfield code="b">4281034900</subfield><subfield code="h">GBV-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">31</subfield><subfield code="1">01</subfield><subfield code="x">0027</subfield><subfield code="b">4280316953</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">34</subfield><subfield code="1">01</subfield><subfield code="x">3551</subfield><subfield code="b">4278872488</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">zi002</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">39</subfield><subfield code="1">01</subfield><subfield code="x">0547</subfield><subfield code="b">4281225951</subfield><subfield code="h">GBV-OAPEN</subfield><subfield code="y">ke</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">40</subfield><subfield code="1">01</subfield><subfield code="x">0007</subfield><subfield code="b">4279940975</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">xsn</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">63</subfield><subfield code="1">01</subfield><subfield code="x">3401</subfield><subfield code="b">4281607803</subfield><subfield code="h">E-Books LF GBV-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="b">4281857893</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">70</subfield><subfield code="1">01</subfield><subfield code="x">0089</subfield><subfield code="b">4280495270</subfield><subfield code="h">OLR-OAPEN-OA</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">72</subfield><subfield code="1">01</subfield><subfield code="x">0035</subfield><subfield code="b">4278695098</subfield><subfield code="h">OLR-OAPEN-OA</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">95</subfield><subfield code="1">01</subfield><subfield code="x">3095</subfield><subfield code="b">4343221784</subfield><subfield code="h">OLR-OAL</subfield><subfield code="k">Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt.</subfield><subfield code="y">z</subfield><subfield code="z">24-06-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">110</subfield><subfield code="1">01</subfield><subfield code="x">3110</subfield><subfield code="b">4281410953</subfield><subfield code="h">OLR-GBV-OAPEN</subfield><subfield code="k">Open Access</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">136</subfield><subfield code="1">01</subfield><subfield code="x">3526</subfield><subfield code="b">4279582041</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">147</subfield><subfield code="1">01</subfield><subfield code="x">3528</subfield><subfield code="b">4282056355</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek</subfield><subfield code="k">Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt.</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">161</subfield><subfield code="1">01</subfield><subfield code="x">0960</subfield><subfield code="b">4278128851</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">187</subfield><subfield code="1">01</subfield><subfield code="x">3520</subfield><subfield code="b">427851364X</subfield><subfield code="k">JSTOR Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">213</subfield><subfield code="1">01</subfield><subfield code="x">0551</subfield><subfield code="b">4279227659</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">230</subfield><subfield code="1">01</subfield><subfield code="x">0552</subfield><subfield code="b">4279404836</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">283</subfield><subfield code="1">01</subfield><subfield code="x">3283</subfield><subfield code="b">4279763747</subfield><subfield code="h">OLR-OAL</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">293</subfield><subfield code="1">01</subfield><subfield code="x">3293</subfield><subfield code="b">4278307861</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="b">4279050228</subfield><subfield code="h">OLR-FREE</subfield><subfield code="k">Kostenloser Zugriff</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">603</subfield><subfield code="1">01</subfield><subfield code="x">4603</subfield><subfield code="b">4277950884</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers.</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">808</subfield><subfield code="1">01</subfield><subfield code="x">4808</subfield><subfield code="b">4280853207</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Library</subfield><subfield code="y">zg</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2403</subfield><subfield code="1">01</subfield><subfield code="x">DE-LFER</subfield><subfield code="b">4307803361</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">n</subfield><subfield code="j">--%%--</subfield><subfield code="y">l01</subfield><subfield code="z">12-04-23</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">22</subfield><subfield code="1">01</subfield><subfield code="x">0018</subfield><subfield code="y">Volltextzugang</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">23</subfield><subfield code="1">01</subfield><subfield code="x">0830</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">30</subfield><subfield code="1">01</subfield><subfield code="x">0104</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">31</subfield><subfield code="1">01</subfield><subfield code="x">0027</subfield><subfield code="y">eBook GBV-OAPEN</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">34</subfield><subfield code="1">01</subfield><subfield code="x">3551</subfield><subfield code="y">OpenAccess</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">40</subfield><subfield code="1">01</subfield><subfield code="x">0007</subfield><subfield code="y">Volltext, Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">63</subfield><subfield code="1">01</subfield><subfield code="x">3401</subfield><subfield code="y">E-Book</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="y">Dieser Titel ist Teil einer Datenbank</subfield><subfield code="r">http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">70</subfield><subfield code="1">01</subfield><subfield code="x">0089</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="z">LF</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">72</subfield><subfield code="1">01</subfield><subfield code="x">0035</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">95</subfield><subfield code="1">01</subfield><subfield code="x">3095</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">110</subfield><subfield code="1">01</subfield><subfield code="x">3110</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">136</subfield><subfield code="1">01</subfield><subfield code="x">3526</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">147</subfield><subfield code="1">01</subfield><subfield code="x">3528</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">161</subfield><subfield code="1">01</subfield><subfield code="x">0960</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="z">LF</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">187</subfield><subfield code="1">01</subfield><subfield code="x">3520</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">213</subfield><subfield code="1">01</subfield><subfield code="x">0551</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">230</subfield><subfield code="1">01</subfield><subfield code="x">0552</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">283</subfield><subfield code="1">01</subfield><subfield code="x">3283</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">293</subfield><subfield code="1">01</subfield><subfield code="x">3293</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="z">LF</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">603</subfield><subfield code="1">01</subfield><subfield code="x">4603</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">808</subfield><subfield code="1">01</subfield><subfield code="x">4808</subfield><subfield code="y">Volltextzugang</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">2403</subfield><subfield code="1">01</subfield><subfield code="x">DE-LFER</subfield><subfield code="r">https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf</subfield></datafield><datafield tag="982" ind1=" " ind2=" "><subfield code="2">31</subfield><subfield code="1">01</subfield><subfield code="x">0027</subfield><subfield code="8">00</subfield><subfield code="a">eBook GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">22</subfield><subfield code="1">01</subfield><subfield code="x">0018</subfield><subfield code="a">OLR-ZDB-94-OAL</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">23</subfield><subfield code="1">01</subfield><subfield code="x">0830</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">30</subfield><subfield code="1">01</subfield><subfield code="x">0104</subfield><subfield code="a">GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">34</subfield><subfield code="1">01</subfield><subfield code="x">3551</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">39</subfield><subfield code="1">01</subfield><subfield code="x">0547</subfield><subfield code="a">GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">39</subfield><subfield code="1">01</subfield><subfield code="x">0547</subfield><subfield code="a">LF</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">40</subfield><subfield code="1">01</subfield><subfield code="x">0007</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">63</subfield><subfield code="1">01</subfield><subfield code="x">3401</subfield><subfield code="a">E-Books LF GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">70</subfield><subfield code="1">01</subfield><subfield code="x">0089</subfield><subfield code="a">OLR-OAPEN-OA</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">72</subfield><subfield code="1">01</subfield><subfield code="x">0035</subfield><subfield code="a">OLR-OAPEN-OA</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">95</subfield><subfield code="1">01</subfield><subfield code="x">3095</subfield><subfield code="a">OLR-OAL</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">110</subfield><subfield code="1">01</subfield><subfield code="x">3110</subfield><subfield code="a">OLR-GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">136</subfield><subfield code="1">01</subfield><subfield code="x">3526</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">147</subfield><subfield code="1">01</subfield><subfield code="x">3528</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">161</subfield><subfield code="1">01</subfield><subfield code="x">0960</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">213</subfield><subfield code="1">01</subfield><subfield code="x">0551</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">230</subfield><subfield code="1">01</subfield><subfield code="x">0552</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">283</subfield><subfield code="1">01</subfield><subfield code="x">3283</subfield><subfield code="a">OLR-OAL</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">293</subfield><subfield code="1">01</subfield><subfield code="x">3293</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="a">OLR-FREE</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="a">olr-ebook GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">603</subfield><subfield code="1">01</subfield><subfield code="x">4603</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">808</subfield><subfield code="1">01</subfield><subfield code="x">4808</subfield><subfield code="a">OLR-OAPEN</subfield></datafield></record></collection>
|
standort_str_mv |
--%%-- |
series2 |
NowOpen |
standort_iln_str_mv |
2403:--%%-- DE-LFER:--%%-- |
author |
Soldatos, John |
spellingShingle |
Soldatos, John misc Computer networking & communications misc Computer networking and communications 31 eBook GBV-OAPEN Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures |
authorStr |
Soldatos, John |
format |
eBook |
delete_txt_mv |
keep |
author_role |
aut |
collection |
KXP GVK SWB |
publishPlace |
Norwell, MA |
remote_str |
true |
abrufzeichen_iln_str_mv |
22@OLR-ZDB-94-OAL 23@OLR-OAPEN 30@GBV-OAPEN 34@OLR-OAPEN 39@GBV-OAPEN 39@LF 40@OLR-OAPEN 63@E-Books LF GBV-OAPEN 65@OLR-OAPEN 70@OLR-OAPEN-OA 72@OLR-OAPEN-OA 95@OLR-OAL 110@OLR-GBV-OAPEN 136@OLR-OAPEN 147@OLR-OAPEN 161@OLR-OAPEN 213@OLR-OAPEN 230@OLR-OAPEN 283@OLR-OAL 293@OLR-OAPEN 370@OLR-FREE 370@olr-ebook GBV-OAPEN 603@OLR-OAPEN 808@OLR-OAPEN |
abrufzeichen_iln_scis_mv |
22@OLR-ZDB-94-OAL 23@OLR-OAPEN 30@GBV-OAPEN 34@OLR-OAPEN 39@GBV-OAPEN 39@LF 40@OLR-OAPEN 63@E-Books LF GBV-OAPEN 65@OLR-OAPEN 70@OLR-OAPEN-OA 72@OLR-OAPEN-OA 95@OLR-OAL 110@OLR-GBV-OAPEN 136@OLR-OAPEN 147@OLR-OAPEN 161@OLR-OAPEN 213@OLR-OAPEN 230@OLR-OAPEN 283@OLR-OAL 293@OLR-OAPEN 370@OLR-FREE 370@olr-ebook GBV-OAPEN 603@OLR-OAPEN 808@OLR-OAPEN |
last_changed_iln_str_mv |
22@01-03-23 23@01-03-23 30@01-03-23 31@01-03-23 34@01-03-23 39@01-03-23 40@01-03-23 63@01-03-23 65@01-03-23 70@01-03-23 72@01-03-23 95@24-06-23 110@01-03-23 136@01-03-23 147@01-03-23 161@28-02-23 187@28-02-23 213@01-03-23 230@01-03-23 283@01-03-23 293@28-02-23 370@01-03-23 603@28-02-23 808@01-03-23 2403@12-04-23 |
illustrated |
Not Illustrated |
topic_title |
31 01 0027 00 eBook GBV-OAPEN Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures Computer networking & communications Computer networking and communications |
publisher |
Now Publishers |
publisherStr |
Now Publishers |
topic |
misc Computer networking & communications misc Computer networking and communications 31 eBook GBV-OAPEN |
topic_unstemmed |
misc Computer networking & communications misc Computer networking and communications 31 eBook GBV-OAPEN |
topic_browse |
misc Computer networking & communications misc Computer networking and communications 31 eBook GBV-OAPEN |
format_facet |
Elektronische Bücher Bücher Elektronische Ressource |
standort_txtP_mv |
--%%-- |
format_main_str_mv |
Text Buch |
carriertype_str_mv |
cr |
author2_variant |
j p jp g g gg |
signature |
--%%-- |
signature_str_mv |
--%%-- |
isbn |
9781680836875 1680836870 9781680836868 1680836862 |
isfreeaccess_txt |
true |
title |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures |
ctrlnum |
(DE-627)1836465793 (DE-599)KEP077594045 (OCoLC)1286309223 (OAPEN)47871 (EBP)077594045 |
exemplarkommentar_str_mv |
22@OAPEN Library 70@OAPEN Online Library Open Access eBook 72@OAPEN Online Library Open Access eBook 95@Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. 110@Open Access 147@frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek 147@Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. 161@OAPEN Online Library Open Access eBook 187@JSTOR Open Access eBook 213@OAPEN Online Library Open Access eBook 230@OAPEN Online Library Open Access eBook 293@OAPEN Online Library Open Access eBook 370@Kostenloser Zugriff 603@Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers. 808@OAPEN Library |
title_full |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures |
author_sort |
Soldatos, John |
callnumber-first-code |
- |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2020 |
contenttype_str_mv |
txt |
author_browse |
Soldatos, John |
selectkey |
22:z 23:z 30:z 31:z 34:z 39:k 40:x 63:z 65:z 70:z 72:z 95:z 110:z 136:z 147:z 161:z 187:z 213:z 230:z 283:z 293:z 370:z 603:z 808:z 2403:l |
physical |
1 Online-Ressource (450 p.) |
format_se |
Elektronische Bücher |
author-letter |
Soldatos, John |
title_sub |
A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures |
author2-role |
herausgeberin |
title_sort |
cyber-physical threat intelligence for critical infrastructures securitya guide to integrated cyber-physical protection of modern critical infrastructures |
title_auth |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures |
abstract |
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies |
abstractGer |
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies |
abstract_unstemmed |
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies |
collection_details |
ZDB-94-OAL GBV_ILN_22 ISIL_DE-18 SYSFLAG_1 GBV_KXP GBV_ILN_23 ISIL_DE-830 GBV_ILN_30 ISIL_DE-104 GBV_ILN_31 ISIL_DE-27 GBV_ILN_34 ISIL_DE-18-302 GBV_ILN_39 ISIL_DE-547 GBV_ILN_40 ISIL_DE-7 GBV_ILN_63 ISIL_DE-Wim2 GBV_ILN_65 ISIL_DE-3 GBV_ILN_70 ISIL_DE-89 GBV_ILN_72 ISIL_DE-35 GBV_ILN_95 ISIL_DE-542 GBV_ILN_110 ISIL_DE-Luen4 GBV_ILN_136 ISIL_DE-Wis1 GBV_ILN_147 ISIL_DE-Fl3 GBV_ILN_161 ISIL_DE-960 GBV_ILN_187 ISIL_DE-Ki95 GBV_ILN_213 ISIL_DE-551 GBV_ILN_230 ISIL_DE-552 GBV_ILN_283 ISIL_DE-Ha163 GBV_ILN_293 ISIL_DE-960-3 GBV_ILN_370 ISIL_DE-1373 GBV_ILN_603 ISIL_DE-B1556 GBV_ILN_808 GBV_ILN_2403 ISIL_DE-LFER |
title_short |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security |
url |
https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf https://library.oapen.org/handle/20.500.12657/47871 |
ausleihindikator_str_mv |
22 23 30 31 34 39 40 63 65 70 72 95 110 136 147 161 187 213 230 283 293 370 603 808 2403:n |
remote_bool |
true |
author2 |
Philpot, James Giunta, Gabriele |
author2Str |
Philpot, James Giunta, Gabriele |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
author2_role |
edt edt |
callnumber-a |
--%%-- |
up_date |
2024-10-09T03:33:10.897Z |
_version_ |
1812405725062758400 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000cam a22002652 4500</leader><controlfield tag="001">1836465793</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20241008145941.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220426s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680836875</subfield><subfield code="9">978-1-68083-687-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680836868</subfield><subfield code="9">978-1-68083-686-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)1836465793</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077594045</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286309223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OAPEN)47871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBP)077594045</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">eng</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UT</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soldatos, John</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security</subfield><subfield code="b">A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwell, MA</subfield><subfield code="b">Now Publishers</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (450 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NowOpen</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Creative Commons</subfield><subfield code="f">https://creativecommons.org/licenses/by-nc/4.0</subfield><subfield code="2">cc</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networking & communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networking and communications</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Philpot, James</subfield><subfield code="e">herausgeberin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Giunta, Gabriele</subfield><subfield code="e">herausgeberin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf</subfield><subfield code="m">X:OAPEN</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="m">X:OAPEN</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-94-OAL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-18</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-830</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_30</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-104</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-27</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_34</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-18-302</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-547</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-7</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Wim2</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-89</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_72</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-35</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-542</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Luen4</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_136</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Wis1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Fl3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-960</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Ki95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-551</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-552</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_283</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-Ha163</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-960-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-1373</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_603</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-B1556</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_808</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2403</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-LFER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">22</subfield><subfield code="1">01</subfield><subfield code="x">0018</subfield><subfield code="b">4280122202</subfield><subfield code="h">OLR-ZDB-94-OAL</subfield><subfield code="k">OAPEN Library</subfield><subfield code="y">zu</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">23</subfield><subfield code="1">01</subfield><subfield code="x">0830</subfield><subfield code="b">4280674264</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="u">f</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">30</subfield><subfield code="1">01</subfield><subfield code="x">0104</subfield><subfield code="b">4281034900</subfield><subfield code="h">GBV-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">31</subfield><subfield code="1">01</subfield><subfield code="x">0027</subfield><subfield code="b">4280316953</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">34</subfield><subfield code="1">01</subfield><subfield code="x">3551</subfield><subfield code="b">4278872488</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">zi002</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">39</subfield><subfield code="1">01</subfield><subfield code="x">0547</subfield><subfield code="b">4281225951</subfield><subfield code="h">GBV-OAPEN</subfield><subfield code="y">ke</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">40</subfield><subfield code="1">01</subfield><subfield code="x">0007</subfield><subfield code="b">4279940975</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">xsn</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">63</subfield><subfield code="1">01</subfield><subfield code="x">3401</subfield><subfield code="b">4281607803</subfield><subfield code="h">E-Books LF GBV-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="b">4281857893</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">70</subfield><subfield code="1">01</subfield><subfield code="x">0089</subfield><subfield code="b">4280495270</subfield><subfield code="h">OLR-OAPEN-OA</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">72</subfield><subfield code="1">01</subfield><subfield code="x">0035</subfield><subfield code="b">4278695098</subfield><subfield code="h">OLR-OAPEN-OA</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">95</subfield><subfield code="1">01</subfield><subfield code="x">3095</subfield><subfield code="b">4343221784</subfield><subfield code="h">OLR-OAL</subfield><subfield code="k">Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt.</subfield><subfield code="y">z</subfield><subfield code="z">24-06-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">110</subfield><subfield code="1">01</subfield><subfield code="x">3110</subfield><subfield code="b">4281410953</subfield><subfield code="h">OLR-GBV-OAPEN</subfield><subfield code="k">Open Access</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">136</subfield><subfield code="1">01</subfield><subfield code="x">3526</subfield><subfield code="b">4279582041</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">147</subfield><subfield code="1">01</subfield><subfield code="x">3528</subfield><subfield code="b">4282056355</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">frei verfügbar für Europa-Universität Flensburg, Hochschule Flensburg und Zentrale Hochschulbibliothek</subfield><subfield code="k">Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt.</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">161</subfield><subfield code="1">01</subfield><subfield code="x">0960</subfield><subfield code="b">4278128851</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">187</subfield><subfield code="1">01</subfield><subfield code="x">3520</subfield><subfield code="b">427851364X</subfield><subfield code="k">JSTOR Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">213</subfield><subfield code="1">01</subfield><subfield code="x">0551</subfield><subfield code="b">4279227659</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">230</subfield><subfield code="1">01</subfield><subfield code="x">0552</subfield><subfield code="b">4279404836</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">283</subfield><subfield code="1">01</subfield><subfield code="x">3283</subfield><subfield code="b">4279763747</subfield><subfield code="h">OLR-OAL</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">293</subfield><subfield code="1">01</subfield><subfield code="x">3293</subfield><subfield code="b">4278307861</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Online Library Open Access eBook</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="b">4279050228</subfield><subfield code="h">OLR-FREE</subfield><subfield code="k">Kostenloser Zugriff</subfield><subfield code="y">z</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">603</subfield><subfield code="1">01</subfield><subfield code="x">4603</subfield><subfield code="b">4277950884</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">Bitte beachten Sie die Nutzungsbedingungen und Copyright-Bestimmungen des Verlages/Herausgebers.</subfield><subfield code="y">z</subfield><subfield code="z">28-02-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">808</subfield><subfield code="1">01</subfield><subfield code="x">4808</subfield><subfield code="b">4280853207</subfield><subfield code="h">OLR-OAPEN</subfield><subfield code="k">OAPEN Library</subfield><subfield code="y">zg</subfield><subfield code="z">01-03-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2403</subfield><subfield code="1">01</subfield><subfield code="x">DE-LFER</subfield><subfield code="b">4307803361</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">n</subfield><subfield code="j">--%%--</subfield><subfield code="y">l01</subfield><subfield code="z">12-04-23</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">22</subfield><subfield code="1">01</subfield><subfield code="x">0018</subfield><subfield code="y">Volltextzugang</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">23</subfield><subfield code="1">01</subfield><subfield code="x">0830</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">30</subfield><subfield code="1">01</subfield><subfield code="x">0104</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">31</subfield><subfield code="1">01</subfield><subfield code="x">0027</subfield><subfield code="y">eBook GBV-OAPEN</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">34</subfield><subfield code="1">01</subfield><subfield code="x">3551</subfield><subfield code="y">OpenAccess</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">40</subfield><subfield code="1">01</subfield><subfield code="x">0007</subfield><subfield code="y">Volltext, Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">63</subfield><subfield code="1">01</subfield><subfield code="x">3401</subfield><subfield code="y">E-Book</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="y">Dieser Titel ist Teil einer Datenbank</subfield><subfield code="r">http://www.bibliothek.uni-regensburg.de/dbinfo/detail.php?titel_id=10728&bib_id=ulb_hal</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">70</subfield><subfield code="1">01</subfield><subfield code="x">0089</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="z">LF</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">72</subfield><subfield code="1">01</subfield><subfield code="x">0035</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">95</subfield><subfield code="1">01</subfield><subfield code="x">3095</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">110</subfield><subfield code="1">01</subfield><subfield code="x">3110</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">136</subfield><subfield code="1">01</subfield><subfield code="x">3526</subfield><subfield code="y">Open Access</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">147</subfield><subfield code="1">01</subfield><subfield code="x">3528</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">161</subfield><subfield code="1">01</subfield><subfield code="x">0960</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="z">LF</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">187</subfield><subfield code="1">01</subfield><subfield code="x">3520</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">213</subfield><subfield code="1">01</subfield><subfield code="x">0551</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">230</subfield><subfield code="1">01</subfield><subfield code="x">0552</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">283</subfield><subfield code="1">01</subfield><subfield code="x">3283</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">293</subfield><subfield code="1">01</subfield><subfield code="x">3293</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield><subfield code="z">LF</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">603</subfield><subfield code="1">01</subfield><subfield code="x">4603</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">808</subfield><subfield code="1">01</subfield><subfield code="x">4808</subfield><subfield code="y">Volltextzugang</subfield><subfield code="r">https://library.oapen.org/handle/20.500.12657/47871</subfield></datafield><datafield tag="981" ind1=" " ind2=" "><subfield code="2">2403</subfield><subfield code="1">01</subfield><subfield code="x">DE-LFER</subfield><subfield code="r">https://library.oapen.org/bitstream/id/e035650e-a0d4-48bd-90fc-012d940d3b6b/9781680836875.pdf</subfield></datafield><datafield tag="982" ind1=" " ind2=" "><subfield code="2">31</subfield><subfield code="1">01</subfield><subfield code="x">0027</subfield><subfield code="8">00</subfield><subfield code="a">eBook GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">22</subfield><subfield code="1">01</subfield><subfield code="x">0018</subfield><subfield code="a">OLR-ZDB-94-OAL</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">23</subfield><subfield code="1">01</subfield><subfield code="x">0830</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">30</subfield><subfield code="1">01</subfield><subfield code="x">0104</subfield><subfield code="a">GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">34</subfield><subfield code="1">01</subfield><subfield code="x">3551</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">39</subfield><subfield code="1">01</subfield><subfield code="x">0547</subfield><subfield code="a">GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">39</subfield><subfield code="1">01</subfield><subfield code="x">0547</subfield><subfield code="a">LF</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">40</subfield><subfield code="1">01</subfield><subfield code="x">0007</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">63</subfield><subfield code="1">01</subfield><subfield code="x">3401</subfield><subfield code="a">E-Books LF GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">65</subfield><subfield code="1">01</subfield><subfield code="x">0003</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">70</subfield><subfield code="1">01</subfield><subfield code="x">0089</subfield><subfield code="a">OLR-OAPEN-OA</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">72</subfield><subfield code="1">01</subfield><subfield code="x">0035</subfield><subfield code="a">OLR-OAPEN-OA</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">95</subfield><subfield code="1">01</subfield><subfield code="x">3095</subfield><subfield code="a">OLR-OAL</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">110</subfield><subfield code="1">01</subfield><subfield code="x">3110</subfield><subfield code="a">OLR-GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">136</subfield><subfield code="1">01</subfield><subfield code="x">3526</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">147</subfield><subfield code="1">01</subfield><subfield code="x">3528</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">161</subfield><subfield code="1">01</subfield><subfield code="x">0960</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">213</subfield><subfield code="1">01</subfield><subfield code="x">0551</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">230</subfield><subfield code="1">01</subfield><subfield code="x">0552</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">283</subfield><subfield code="1">01</subfield><subfield code="x">3283</subfield><subfield code="a">OLR-OAL</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">293</subfield><subfield code="1">01</subfield><subfield code="x">3293</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="a">OLR-FREE</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">370</subfield><subfield code="1">01</subfield><subfield code="x">4370</subfield><subfield code="a">olr-ebook GBV-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">603</subfield><subfield code="1">01</subfield><subfield code="x">4603</subfield><subfield code="a">OLR-OAPEN</subfield></datafield><datafield tag="995" ind1=" " ind2=" "><subfield code="2">808</subfield><subfield code="1">01</subfield><subfield code="x">4808</subfield><subfield code="a">OLR-OAPEN</subfield></datafield></record></collection>
|
score |
7.013912 |