Counteracting social engineering attacks
Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain...
Ausführliche Beschreibung
Autor*in: |
Yasin, Affan [verfasserIn] Fatima, Rubia [verfasserIn] Liu, Lin [verfasserIn] Wanga, Jianmin [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2021 |
---|
Übergeordnetes Werk: |
Enthalten in: Computer fraud & security - London : Mark Allen Group, 1996, 2021, Seite 15-19 |
---|---|
Übergeordnetes Werk: |
volume:2021 ; pages:15-19 |
DOI / URN: |
10.1016/S1361-3723(21)00108-1 |
---|
Katalog-ID: |
ELV006830625 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV006830625 | ||
003 | DE-627 | ||
005 | 20230524162340.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230506s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/S1361-3723(21)00108-1 |2 doi | |
035 | |a (DE-627)ELV006830625 | ||
035 | |a (ELSEVIER)S1361-3723(21)00108-1 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q DE-600 |
084 | |a INTRECHT |q DE-1a |2 fid | ||
084 | |a 54.38 |2 bkl | ||
100 | 1 | |a Yasin, Affan |e verfasserin |4 aut | |
245 | 1 | 0 | |a Counteracting social engineering attacks |
264 | 1 | |c 2021 | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. | ||
700 | 1 | |a Fatima, Rubia |e verfasserin |4 aut | |
700 | 1 | |a Liu, Lin |e verfasserin |4 aut | |
700 | 1 | |a Wanga, Jianmin |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Computer fraud & security |d London : Mark Allen Group, 1996 |g 2021, Seite 15-19 |h Online-Ressource |w (DE-627)394487230 |w (DE-600)2161462-3 |w (DE-576)259272868 |x 1873-7056 |7 nnns |
773 | 1 | 8 | |g volume:2021 |g pages:15-19 |
912 | |a GBV_USEFLAG_U | ||
912 | |a SYSFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a FID-INTRECHT | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2336 | ||
936 | b | k | |a 54.38 |j Computersicherheit |
951 | |a AR | ||
952 | |d 2021 |h 15-19 |
author_variant |
a y ay r f rf l l ll j w jw |
---|---|
matchkey_str |
article:18737056:2021----::oneatnscaegne |
hierarchy_sort_str |
2021 |
bklnumber |
54.38 |
publishDate |
2021 |
allfields |
10.1016/S1361-3723(21)00108-1 doi (DE-627)ELV006830625 (ELSEVIER)S1361-3723(21)00108-1 DE-627 ger DE-627 rda eng 004 DE-600 INTRECHT DE-1a fid 54.38 bkl Yasin, Affan verfasserin aut Counteracting social engineering attacks 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. Fatima, Rubia verfasserin aut Liu, Lin verfasserin aut Wanga, Jianmin verfasserin aut Enthalten in Computer fraud & security London : Mark Allen Group, 1996 2021, Seite 15-19 Online-Ressource (DE-627)394487230 (DE-600)2161462-3 (DE-576)259272868 1873-7056 nnns volume:2021 pages:15-19 GBV_USEFLAG_U SYSFLAG_U GBV_ELV FID-INTRECHT GBV_ILN_11 GBV_ILN_31 GBV_ILN_70 GBV_ILN_95 GBV_ILN_150 GBV_ILN_2004 GBV_ILN_2336 54.38 Computersicherheit AR 2021 15-19 |
spelling |
10.1016/S1361-3723(21)00108-1 doi (DE-627)ELV006830625 (ELSEVIER)S1361-3723(21)00108-1 DE-627 ger DE-627 rda eng 004 DE-600 INTRECHT DE-1a fid 54.38 bkl Yasin, Affan verfasserin aut Counteracting social engineering attacks 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. Fatima, Rubia verfasserin aut Liu, Lin verfasserin aut Wanga, Jianmin verfasserin aut Enthalten in Computer fraud & security London : Mark Allen Group, 1996 2021, Seite 15-19 Online-Ressource (DE-627)394487230 (DE-600)2161462-3 (DE-576)259272868 1873-7056 nnns volume:2021 pages:15-19 GBV_USEFLAG_U SYSFLAG_U GBV_ELV FID-INTRECHT GBV_ILN_11 GBV_ILN_31 GBV_ILN_70 GBV_ILN_95 GBV_ILN_150 GBV_ILN_2004 GBV_ILN_2336 54.38 Computersicherheit AR 2021 15-19 |
allfields_unstemmed |
10.1016/S1361-3723(21)00108-1 doi (DE-627)ELV006830625 (ELSEVIER)S1361-3723(21)00108-1 DE-627 ger DE-627 rda eng 004 DE-600 INTRECHT DE-1a fid 54.38 bkl Yasin, Affan verfasserin aut Counteracting social engineering attacks 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. Fatima, Rubia verfasserin aut Liu, Lin verfasserin aut Wanga, Jianmin verfasserin aut Enthalten in Computer fraud & security London : Mark Allen Group, 1996 2021, Seite 15-19 Online-Ressource (DE-627)394487230 (DE-600)2161462-3 (DE-576)259272868 1873-7056 nnns volume:2021 pages:15-19 GBV_USEFLAG_U SYSFLAG_U GBV_ELV FID-INTRECHT GBV_ILN_11 GBV_ILN_31 GBV_ILN_70 GBV_ILN_95 GBV_ILN_150 GBV_ILN_2004 GBV_ILN_2336 54.38 Computersicherheit AR 2021 15-19 |
allfieldsGer |
10.1016/S1361-3723(21)00108-1 doi (DE-627)ELV006830625 (ELSEVIER)S1361-3723(21)00108-1 DE-627 ger DE-627 rda eng 004 DE-600 INTRECHT DE-1a fid 54.38 bkl Yasin, Affan verfasserin aut Counteracting social engineering attacks 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. Fatima, Rubia verfasserin aut Liu, Lin verfasserin aut Wanga, Jianmin verfasserin aut Enthalten in Computer fraud & security London : Mark Allen Group, 1996 2021, Seite 15-19 Online-Ressource (DE-627)394487230 (DE-600)2161462-3 (DE-576)259272868 1873-7056 nnns volume:2021 pages:15-19 GBV_USEFLAG_U SYSFLAG_U GBV_ELV FID-INTRECHT GBV_ILN_11 GBV_ILN_31 GBV_ILN_70 GBV_ILN_95 GBV_ILN_150 GBV_ILN_2004 GBV_ILN_2336 54.38 Computersicherheit AR 2021 15-19 |
allfieldsSound |
10.1016/S1361-3723(21)00108-1 doi (DE-627)ELV006830625 (ELSEVIER)S1361-3723(21)00108-1 DE-627 ger DE-627 rda eng 004 DE-600 INTRECHT DE-1a fid 54.38 bkl Yasin, Affan verfasserin aut Counteracting social engineering attacks 2021 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. Fatima, Rubia verfasserin aut Liu, Lin verfasserin aut Wanga, Jianmin verfasserin aut Enthalten in Computer fraud & security London : Mark Allen Group, 1996 2021, Seite 15-19 Online-Ressource (DE-627)394487230 (DE-600)2161462-3 (DE-576)259272868 1873-7056 nnns volume:2021 pages:15-19 GBV_USEFLAG_U SYSFLAG_U GBV_ELV FID-INTRECHT GBV_ILN_11 GBV_ILN_31 GBV_ILN_70 GBV_ILN_95 GBV_ILN_150 GBV_ILN_2004 GBV_ILN_2336 54.38 Computersicherheit AR 2021 15-19 |
language |
English |
source |
Enthalten in Computer fraud & security 2021, Seite 15-19 volume:2021 pages:15-19 |
sourceStr |
Enthalten in Computer fraud & security 2021, Seite 15-19 volume:2021 pages:15-19 |
format_phy_str_mv |
Article |
bklname |
Computersicherheit |
institution |
findex.gbv.de |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computer fraud & security |
authorswithroles_txt_mv |
Yasin, Affan @@aut@@ Fatima, Rubia @@aut@@ Liu, Lin @@aut@@ Wanga, Jianmin @@aut@@ |
publishDateDaySort_date |
2021-01-01T00:00:00Z |
hierarchy_top_id |
394487230 |
dewey-sort |
14 |
id |
ELV006830625 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV006830625</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230524162340.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230506s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/S1361-3723(21)00108-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV006830625</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1361-3723(21)00108-1</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">INTRECHT</subfield><subfield code="q">DE-1a</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yasin, Affan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counteracting social engineering attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fatima, Rubia</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Lin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wanga, Jianmin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer fraud & security</subfield><subfield code="d">London : Mark Allen Group, 1996</subfield><subfield code="g">2021, Seite 15-19</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)394487230</subfield><subfield code="w">(DE-600)2161462-3</subfield><subfield code="w">(DE-576)259272868</subfield><subfield code="x">1873-7056</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:2021</subfield><subfield code="g">pages:15-19</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-INTRECHT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.38</subfield><subfield code="j">Computersicherheit</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">2021</subfield><subfield code="h">15-19</subfield></datafield></record></collection>
|
author |
Yasin, Affan |
spellingShingle |
Yasin, Affan ddc 004 fid INTRECHT bkl 54.38 Counteracting social engineering attacks |
authorStr |
Yasin, Affan |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)394487230 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1873-7056 |
topic_title |
004 DE-600 INTRECHT DE-1a fid 54.38 bkl Counteracting social engineering attacks |
topic |
ddc 004 fid INTRECHT bkl 54.38 |
topic_unstemmed |
ddc 004 fid INTRECHT bkl 54.38 |
topic_browse |
ddc 004 fid INTRECHT bkl 54.38 |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Computer fraud & security |
hierarchy_parent_id |
394487230 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Computer fraud & security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)394487230 (DE-600)2161462-3 (DE-576)259272868 |
title |
Counteracting social engineering attacks |
ctrlnum |
(DE-627)ELV006830625 (ELSEVIER)S1361-3723(21)00108-1 |
title_full |
Counteracting social engineering attacks |
author_sort |
Yasin, Affan |
journal |
Computer fraud & security |
journalStr |
Computer fraud & security |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2021 |
contenttype_str_mv |
zzz |
container_start_page |
15 |
author_browse |
Yasin, Affan Fatima, Rubia Liu, Lin Wanga, Jianmin |
container_volume |
2021 |
class |
004 DE-600 INTRECHT DE-1a fid 54.38 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Yasin, Affan |
doi_str_mv |
10.1016/S1361-3723(21)00108-1 |
dewey-full |
004 |
author2-role |
verfasserin |
title_sort |
counteracting social engineering attacks |
title_auth |
Counteracting social engineering attacks |
abstract |
Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. |
abstractGer |
Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. |
abstract_unstemmed |
Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks. |
collection_details |
GBV_USEFLAG_U SYSFLAG_U GBV_ELV FID-INTRECHT GBV_ILN_11 GBV_ILN_31 GBV_ILN_70 GBV_ILN_95 GBV_ILN_150 GBV_ILN_2004 GBV_ILN_2336 |
title_short |
Counteracting social engineering attacks |
remote_bool |
true |
author2 |
Fatima, Rubia Liu, Lin Wanga, Jianmin |
author2Str |
Fatima, Rubia Liu, Lin Wanga, Jianmin |
ppnlink |
394487230 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1016/S1361-3723(21)00108-1 |
up_date |
2024-07-06T22:41:42.122Z |
_version_ |
1803871271909326848 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV006830625</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230524162340.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230506s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/S1361-3723(21)00108-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV006830625</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1361-3723(21)00108-1</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">INTRECHT</subfield><subfield code="q">DE-1a</subfield><subfield code="2">fid</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yasin, Affan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counteracting social engineering attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fatima, Rubia</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Lin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wanga, Jianmin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer fraud & security</subfield><subfield code="d">London : Mark Allen Group, 1996</subfield><subfield code="g">2021, Seite 15-19</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)394487230</subfield><subfield code="w">(DE-600)2161462-3</subfield><subfield code="w">(DE-576)259272868</subfield><subfield code="x">1873-7056</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:2021</subfield><subfield code="g">pages:15-19</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">FID-INTRECHT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.38</subfield><subfield code="j">Computersicherheit</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">2021</subfield><subfield code="h">15-19</subfield></datafield></record></collection>
|
score |
7.400776 |