From threat to security indexing: a causal chain
Autor*in: |
Khan, R.A. [verfasserIn] |
---|
Format: |
Artikel |
---|
Erschienen: |
2009 |
---|
Umfang: |
4 |
---|
Übergeordnetes Werk: |
Enthalten in: Computer fraud & security - Oxford [u.a.] : Elsevier Science, 1995, (2009) vom: Mai, Seite 9-12 |
---|---|
Übergeordnetes Werk: |
year:2009 ; month:05 ; pages:9-12 ; extent:4 |
Katalog-ID: |
OLC1824948077 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC1824948077 | ||
003 | DE-627 | ||
005 | 20230711084020.0 | ||
007 | tu | ||
008 | 090902s2009 xx ||||| 00| ||und c | ||
028 | 5 | 2 | |a sw090902 |
035 | |a (DE-627)OLC1824948077 | ||
035 | |a (DE-599)GBVOLC1824948077 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
082 | 0 | 4 | |a 004 |
100 | 1 | |a Khan, R.A. |e verfasserin |4 aut | |
245 | 1 | 0 | |a From threat to security indexing: a causal chain |
264 | 1 | |c 2009 | |
300 | |a 4 | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
700 | 1 | |a Mustafa, K. |4 oth | |
773 | 0 | 8 | |i Enthalten in |t Computer fraud & security |d Oxford [u.a.] : Elsevier Science, 1995 |g (2009) vom: Mai, Seite 9-12 |w (DE-627)191053724 |w (DE-600)1291569-5 |w (DE-576)313890706 |x 1361-3723 |7 nnns |
773 | 1 | 8 | |g year:2009 |g month:05 |g pages:9-12 |g extent:4 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |j 2009 |c 05 |h 9-12 |g 4 |
author_variant |
r k rk |
---|---|
matchkey_str |
article:13613723:2009----::rmhetoeuiyneigc |
hierarchy_sort_str |
2009 |
publishDate |
2009 |
allfields |
sw090902 (DE-627)OLC1824948077 (DE-599)GBVOLC1824948077 DE-627 ger DE-627 rakwb 004 Khan, R.A. verfasserin aut From threat to security indexing: a causal chain 2009 4 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Mustafa, K. oth Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 (2009) vom: Mai, Seite 9-12 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns year:2009 month:05 pages:9-12 extent:4 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 AR 2009 05 9-12 4 |
spelling |
sw090902 (DE-627)OLC1824948077 (DE-599)GBVOLC1824948077 DE-627 ger DE-627 rakwb 004 Khan, R.A. verfasserin aut From threat to security indexing: a causal chain 2009 4 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Mustafa, K. oth Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 (2009) vom: Mai, Seite 9-12 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns year:2009 month:05 pages:9-12 extent:4 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 AR 2009 05 9-12 4 |
allfields_unstemmed |
sw090902 (DE-627)OLC1824948077 (DE-599)GBVOLC1824948077 DE-627 ger DE-627 rakwb 004 Khan, R.A. verfasserin aut From threat to security indexing: a causal chain 2009 4 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Mustafa, K. oth Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 (2009) vom: Mai, Seite 9-12 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns year:2009 month:05 pages:9-12 extent:4 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 AR 2009 05 9-12 4 |
allfieldsGer |
sw090902 (DE-627)OLC1824948077 (DE-599)GBVOLC1824948077 DE-627 ger DE-627 rakwb 004 Khan, R.A. verfasserin aut From threat to security indexing: a causal chain 2009 4 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Mustafa, K. oth Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 (2009) vom: Mai, Seite 9-12 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns year:2009 month:05 pages:9-12 extent:4 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 AR 2009 05 9-12 4 |
allfieldsSound |
sw090902 (DE-627)OLC1824948077 (DE-599)GBVOLC1824948077 DE-627 ger DE-627 rakwb 004 Khan, R.A. verfasserin aut From threat to security indexing: a causal chain 2009 4 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Mustafa, K. oth Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 (2009) vom: Mai, Seite 9-12 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns year:2009 month:05 pages:9-12 extent:4 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 AR 2009 05 9-12 4 |
source |
Enthalten in Computer fraud & security (2009) vom: Mai, Seite 9-12 year:2009 month:05 pages:9-12 extent:4 |
sourceStr |
Enthalten in Computer fraud & security (2009) vom: Mai, Seite 9-12 year:2009 month:05 pages:9-12 extent:4 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computer fraud & security |
authorswithroles_txt_mv |
Khan, R.A. @@aut@@ Mustafa, K. @@oth@@ |
publishDateDaySort_date |
2009-05-01T00:00:00Z |
hierarchy_top_id |
191053724 |
dewey-sort |
14 |
id |
OLC1824948077 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1824948077</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230711084020.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">090902s2009 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw090902</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1824948077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1824948077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Khan, R.A.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From threat to security indexing: a causal chain</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">4</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mustafa, K.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer fraud & security</subfield><subfield code="d">Oxford [u.a.] : Elsevier Science, 1995</subfield><subfield code="g">(2009) vom: Mai, Seite 9-12</subfield><subfield code="w">(DE-627)191053724</subfield><subfield code="w">(DE-600)1291569-5</subfield><subfield code="w">(DE-576)313890706</subfield><subfield code="x">1361-3723</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">year:2009</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:9-12</subfield><subfield code="g">extent:4</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="j">2009</subfield><subfield code="c">05</subfield><subfield code="h">9-12</subfield><subfield code="g">4</subfield></datafield></record></collection>
|
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1824948077</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230711084020.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">090902s2009 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw090902</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1824948077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1824948077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Khan, R.A.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From threat to security indexing: a causal chain</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">4</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mustafa, K.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer fraud & security</subfield><subfield code="d">Oxford [u.a.] : Elsevier Science, 1995</subfield><subfield code="g">(2009) vom: Mai, Seite 9-12</subfield><subfield code="w">(DE-627)191053724</subfield><subfield code="w">(DE-600)1291569-5</subfield><subfield code="w">(DE-576)313890706</subfield><subfield code="x">1361-3723</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">year:2009</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:9-12</subfield><subfield code="g">extent:4</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="j">2009</subfield><subfield code="c">05</subfield><subfield code="h">9-12</subfield><subfield code="g">4</subfield></datafield></record></collection>
|
author |
Khan, R.A. |
spellingShingle |
Khan, R.A. ddc 004 From threat to security indexing: a causal chain |
authorStr |
Khan, R.A. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)191053724 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1361-3723 |
topic_title |
004 From threat to security indexing: a causal chain |
topic |
ddc 004 |
topic_unstemmed |
ddc 004 |
topic_browse |
ddc 004 |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
k m km |
hierarchy_parent_title |
Computer fraud & security |
hierarchy_parent_id |
191053724 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Computer fraud & security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 |
title |
From threat to security indexing: a causal chain |
ctrlnum |
(DE-627)OLC1824948077 (DE-599)GBVOLC1824948077 |
title_full |
From threat to security indexing: a causal chain |
author_sort |
Khan, R.A. |
journal |
Computer fraud & security |
journalStr |
Computer fraud & security |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2009 |
contenttype_str_mv |
txt |
container_start_page |
9 |
author_browse |
Khan, R.A. |
physical |
4 |
class |
004 |
format_se |
Aufsätze |
author-letter |
Khan, R.A. |
dewey-full |
004 |
title_sort |
from threat to security indexing: a causal chain |
title_auth |
From threat to security indexing: a causal chain |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 |
title_short |
From threat to security indexing: a causal chain |
remote_bool |
false |
author2 |
Mustafa, K. |
author2Str |
Mustafa, K. |
ppnlink |
191053724 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth |
up_date |
2024-07-03T23:03:42.239Z |
_version_ |
1803600865254178816 |
score |
7.4009485 |