Google under attack for wifi snooping
Gespeichert in:
Format: |
Artikel |
---|
Erschienen: |
2010 |
---|
Umfang: |
1 |
---|
Übergeordnetes Werk: |
Enthalten in: Computer fraud & security - Oxford [u.a.] : Elsevier Science, 1995, 2010(2010), 5 vom: Mai, Seite 20-21 |
---|---|
Übergeordnetes Werk: |
volume:2010 ; year:2010 ; number:5 ; month:05 ; pages:20-21 ; extent:1 |
Katalog-ID: |
OLC1844238237 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC1844238237 | ||
003 | DE-627 | ||
005 | 20230711185948.0 | ||
007 | tu | ||
008 | 100622s2010 xx ||||| 00| ||und c | ||
028 | 5 | 2 | |a sw100621_1 |
035 | |a (DE-627)OLC1844238237 | ||
035 | |a (DE-599)GBVOLC1844238237 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
082 | 0 | 4 | |a 004 |
245 | 1 | 0 | |a Google under attack for wifi snooping |
264 | 1 | |c 2010 | |
300 | |a 1 | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
773 | 0 | 8 | |i Enthalten in |t Computer fraud & security |d Oxford [u.a.] : Elsevier Science, 1995 |g 2010(2010), 5 vom: Mai, Seite 20-21 |w (DE-627)191053724 |w (DE-600)1291569-5 |w (DE-576)313890706 |x 1361-3723 |7 nnns |
773 | 1 | 8 | |g volume:2010 |g year:2010 |g number:5 |g month:05 |g pages:20-21 |g extent:1 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2009 | ||
951 | |a AR | ||
952 | |d 2010 |j 2010 |e 5 |c 5 |h 20-21 |g 1 |
matchkey_str |
article:13613723:2010----::ogeneatcfrii |
---|---|
hierarchy_sort_str |
2010 |
publishDate |
2010 |
allfields |
sw100621_1 (DE-627)OLC1844238237 (DE-599)GBVOLC1844238237 DE-627 ger DE-627 rakwb 004 Google under attack for wifi snooping 2010 1 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 2010(2010), 5 vom: Mai, Seite 20-21 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 GBV_ILN_2009 AR 2010 2010 5 5 20-21 1 |
spelling |
sw100621_1 (DE-627)OLC1844238237 (DE-599)GBVOLC1844238237 DE-627 ger DE-627 rakwb 004 Google under attack for wifi snooping 2010 1 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 2010(2010), 5 vom: Mai, Seite 20-21 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 GBV_ILN_2009 AR 2010 2010 5 5 20-21 1 |
allfields_unstemmed |
sw100621_1 (DE-627)OLC1844238237 (DE-599)GBVOLC1844238237 DE-627 ger DE-627 rakwb 004 Google under attack for wifi snooping 2010 1 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 2010(2010), 5 vom: Mai, Seite 20-21 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 GBV_ILN_2009 AR 2010 2010 5 5 20-21 1 |
allfieldsGer |
sw100621_1 (DE-627)OLC1844238237 (DE-599)GBVOLC1844238237 DE-627 ger DE-627 rakwb 004 Google under attack for wifi snooping 2010 1 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 2010(2010), 5 vom: Mai, Seite 20-21 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 GBV_ILN_2009 AR 2010 2010 5 5 20-21 1 |
allfieldsSound |
sw100621_1 (DE-627)OLC1844238237 (DE-599)GBVOLC1844238237 DE-627 ger DE-627 rakwb 004 Google under attack for wifi snooping 2010 1 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Enthalten in Computer fraud & security Oxford [u.a.] : Elsevier Science, 1995 2010(2010), 5 vom: Mai, Seite 20-21 (DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 1361-3723 nnns volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 GBV_ILN_2009 AR 2010 2010 5 5 20-21 1 |
source |
Enthalten in Computer fraud & security 2010(2010), 5 vom: Mai, Seite 20-21 volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 |
sourceStr |
Enthalten in Computer fraud & security 2010(2010), 5 vom: Mai, Seite 20-21 volume:2010 year:2010 number:5 month:05 pages:20-21 extent:1 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computer fraud & security |
publishDateDaySort_date |
2010-05-01T00:00:00Z |
hierarchy_top_id |
191053724 |
dewey-sort |
14 |
id |
OLC1844238237 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1844238237</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230711185948.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">100622s2010 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw100621_1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1844238237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1844238237</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Google under attack for wifi snooping</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer fraud & security</subfield><subfield code="d">Oxford [u.a.] : Elsevier Science, 1995</subfield><subfield code="g">2010(2010), 5 vom: Mai, Seite 20-21</subfield><subfield code="w">(DE-627)191053724</subfield><subfield code="w">(DE-600)1291569-5</subfield><subfield code="w">(DE-576)313890706</subfield><subfield code="x">1361-3723</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:2010</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:5</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:20-21</subfield><subfield code="g">extent:1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">2010</subfield><subfield code="j">2010</subfield><subfield code="e">5</subfield><subfield code="c">5</subfield><subfield code="h">20-21</subfield><subfield code="g">1</subfield></datafield></record></collection>
|
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC1844238237</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230711185948.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">100622s2010 xx ||||| 00| ||und c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">sw100621_1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1844238237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1844238237</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Google under attack for wifi snooping</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computer fraud & security</subfield><subfield code="d">Oxford [u.a.] : Elsevier Science, 1995</subfield><subfield code="g">2010(2010), 5 vom: Mai, Seite 20-21</subfield><subfield code="w">(DE-627)191053724</subfield><subfield code="w">(DE-600)1291569-5</subfield><subfield code="w">(DE-576)313890706</subfield><subfield code="x">1361-3723</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:2010</subfield><subfield code="g">year:2010</subfield><subfield code="g">number:5</subfield><subfield code="g">month:05</subfield><subfield code="g">pages:20-21</subfield><subfield code="g">extent:1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">2010</subfield><subfield code="j">2010</subfield><subfield code="e">5</subfield><subfield code="c">5</subfield><subfield code="h">20-21</subfield><subfield code="g">1</subfield></datafield></record></collection>
|
ppnlink_with_tag_str_mv |
@@773@@(DE-627)191053724 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1361-3723 |
topic_title |
004 Google under attack for wifi snooping |
topic |
ddc 004 |
spellingShingle |
ddc 004 Google under attack for wifi snooping |
topic_unstemmed |
ddc 004 |
topic_browse |
ddc 004 |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Computer fraud & security |
hierarchy_parent_id |
191053724 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Computer fraud & security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)191053724 (DE-600)1291569-5 (DE-576)313890706 |
title |
Google under attack for wifi snooping |
ctrlnum |
(DE-627)OLC1844238237 (DE-599)GBVOLC1844238237 |
title_full |
Google under attack for wifi snooping |
journal |
Computer fraud & security |
journalStr |
Computer fraud & security |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2010 |
contenttype_str_mv |
txt |
container_start_page |
20 |
container_volume |
2010 |
physical |
1 |
class |
004 |
format_se |
Aufsätze |
dewey-full |
004 |
title_sort |
google under attack for wifi snooping |
title_auth |
Google under attack for wifi snooping |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_11 GBV_ILN_70 GBV_ILN_2009 |
container_issue |
5 |
title_short |
Google under attack for wifi snooping |
remote_bool |
false |
ppnlink |
191053724 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
up_date |
2024-07-03T17:55:56.678Z |
_version_ |
1803581502713233408 |
score |
7.400672 |