|
|
|
|
LEADER |
01000caa a22002652 4500 |
001 |
1625603568 |
003 |
DE-627 |
005 |
20230426124218.0 |
007 |
tu |
008 |
110520s2011 xx ||||| 00| ||ger c |
035 |
|
|
|a (DE-627)1625603568
|
035 |
|
|
|a (DE-576)344762793
|
035 |
|
|
|a (DE-599)BSZ344762793
|
035 |
|
|
|a (DE-615)00324004
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a ger
|
084 |
|
|
|a RQ
|2 fivr
|
084 |
|
|
|a SC
|2 fivs
|
084 |
|
|
|a SI03.02
|2 fivs
|
100 |
1 |
|
|a Gaycken, Sandro
|d 1973-
|e verfasserin
|0 (DE-588)133953688
|0 (DE-627)558831931
|0 (DE-576)265510775
|4 aut
|
245 |
1 |
0 |
|a Krieg der Rechner
|b warum es so schwierig ist, sich vor militärischen Cyberangriffen zu schützen
|c Sandro Gaycken
|
264 |
|
1 |
|a Bielefeld
|c 2011
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
650 |
0 |
7 |
|0 (DE-588)4026926-7
|0 (DE-627)106286609
|0 (DE-576)208968547
|a Informationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4031888-6
|0 (DE-627)106263714
|0 (DE-576)208994688
|a Kommunikationstechnik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4116489-1
|0 (DE-627)104325224
|0 (DE-576)209502010
|a Sicherheitspolitik
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4188166-7
|0 (DE-627)10526668X
|0 (DE-576)210051035
|a Verwundbarkeit
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4113821-1
|0 (DE-627)105826642
|0 (DE-576)209479604
|a Hacker
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4203217-9
|0 (DE-627)105152595
|0 (DE-576)210153679
|a Operation
|g Militär
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4141194-8
|0 (DE-627)104188618
|0 (DE-576)209709227
|a Abwehr
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)4142472-4
|0 (DE-627)105612936
|0 (DE-576)209719052
|a Angriff
|2 gnd
|
650 |
0 |
7 |
|0 (DE-588)7859045-0
|0 (DE-627)700633154
|0 (DE-576)361772335
|a Effektivität
|2 gnd
|
651 |
|
7 |
|0 (DE-588)1135962553
|0 (DE-627)890988382
|0 (DE-576)490197698
|a Erde
|2 gnd
|
773 |
0 |
8 |
|i In
|t Internationale Politik
|d Berlin : Deutsche Gesellschaft für Auswärtige Politik, 1995
|g (2011), 66 (März-April 2011) 2, Seite 88-95
|w (DE-627)182605892
|w (DE-600)1220775-5
|w (DE-576)045296375
|x 1430-175X
|7 nnns
|
773 |
1 |
8 |
|g year:2011
|g number:66 (März-April 2011) 2
|g pages:88-95
|
912 |
|
|
|a GBV_USEFLAG_U
|
912 |
|
|
|a GBV_ILN_2040
|
912 |
|
|
|a ISIL_DE-212
|
912 |
|
|
|a SYSFLAG_1
|
912 |
|
|
|a GBV_KXP
|
912 |
|
|
|a SSG-OLC-PHA
|
912 |
|
|
|a GBV_ILN_11
|
912 |
|
|
|a GBV_ILN_20
|
912 |
|
|
|a GBV_ILN_21
|
912 |
|
|
|a GBV_ILN_22
|
912 |
|
|
|a GBV_ILN_24
|
912 |
|
|
|a GBV_ILN_26
|
912 |
|
|
|a GBV_ILN_31
|
912 |
|
|
|a GBV_ILN_32
|
912 |
|
|
|a GBV_ILN_39
|
912 |
|
|
|a GBV_ILN_40
|
912 |
|
|
|a GBV_ILN_60
|
912 |
|
|
|a GBV_ILN_65
|
912 |
|
|
|a GBV_ILN_69
|
912 |
|
|
|a GBV_ILN_70
|
912 |
|
|
|a GBV_ILN_77
|
912 |
|
|
|a GBV_ILN_78
|
912 |
|
|
|a GBV_ILN_100
|
912 |
|
|
|a GBV_ILN_110
|
912 |
|
|
|a GBV_ILN_119
|
912 |
|
|
|a GBV_ILN_120
|
912 |
|
|
|a GBV_ILN_121
|
912 |
|
|
|a GBV_ILN_130
|
912 |
|
|
|a GBV_ILN_147
|
912 |
|
|
|a GBV_ILN_216
|
912 |
|
|
|a GBV_ILN_227
|
912 |
|
|
|a GBV_ILN_267
|
912 |
|
|
|a GBV_ILN_285
|
912 |
|
|
|a GBV_ILN_350
|
912 |
|
|
|a GBV_ILN_607
|
912 |
|
|
|a GBV_ILN_640
|
912 |
|
|
|a GBV_ILN_1023
|
912 |
|
|
|a GBV_ILN_2001
|
912 |
|
|
|a GBV_ILN_2002
|
912 |
|
|
|a GBV_ILN_2004
|
912 |
|
|
|a GBV_ILN_2005
|
912 |
|
|
|a GBV_ILN_2006
|
912 |
|
|
|a GBV_ILN_2007
|
912 |
|
|
|a GBV_ILN_2008
|
912 |
|
|
|a GBV_ILN_2009
|
912 |
|
|
|a GBV_ILN_2010
|
912 |
|
|
|a GBV_ILN_2012
|
912 |
|
|
|a GBV_ILN_2014
|
912 |
|
|
|a GBV_ILN_2015
|
912 |
|
|
|a GBV_ILN_2018
|
912 |
|
|
|a GBV_ILN_2020
|
912 |
|
|
|a GBV_ILN_2023
|
912 |
|
|
|a GBV_ILN_2024
|
912 |
|
|
|a GBV_ILN_2025
|
912 |
|
|
|a GBV_ILN_2031
|
912 |
|
|
|a GBV_ILN_2032
|
912 |
|
|
|a GBV_ILN_2035
|
912 |
|
|
|a GBV_ILN_2037
|
912 |
|
|
|a GBV_ILN_2038
|
912 |
|
|
|a GBV_ILN_2039
|
912 |
|
|
|a GBV_ILN_2050
|
912 |
|
|
|a GBV_ILN_2060
|
912 |
|
|
|a GBV_ILN_2105
|
912 |
|
|
|a GBV_ILN_2121
|
912 |
|
|
|a GBV_ILN_2150
|
912 |
|
|
|a GBV_ILN_2206
|
912 |
|
|
|a GBV_ILN_2470
|
912 |
|
|
|a GBV_ILN_2508
|
912 |
|
|
|a GBV_ILN_2548
|
912 |
|
|
|a GBV_ILN_4012
|
912 |
|
|
|a GBV_ILN_4027
|
912 |
|
|
|a GBV_ILN_4028
|
912 |
|
|
|a GBV_ILN_4029
|
912 |
|
|
|a GBV_ILN_4035
|
912 |
|
|
|a GBV_ILN_4036
|
912 |
|
|
|a GBV_ILN_4082
|
912 |
|
|
|a GBV_ILN_4112
|
912 |
|
|
|a GBV_ILN_4116
|
912 |
|
|
|a GBV_ILN_4125
|
912 |
|
|
|a GBV_ILN_4126
|
912 |
|
|
|a GBV_ILN_4193
|
912 |
|
|
|a GBV_ILN_4238
|
912 |
|
|
|a GBV_ILN_4253
|
912 |
|
|
|a GBV_ILN_4261
|
912 |
|
|
|a GBV_ILN_4266
|
912 |
|
|
|a GBV_ILN_4277
|
912 |
|
|
|a GBV_ILN_4302
|
912 |
|
|
|a GBV_ILN_4305
|
912 |
|
|
|a GBV_ILN_4306
|
912 |
|
|
|a GBV_ILN_4307
|
912 |
|
|
|a GBV_ILN_4310
|
912 |
|
|
|a GBV_ILN_4311
|
912 |
|
|
|a GBV_ILN_4314
|
912 |
|
|
|a GBV_ILN_4316
|
912 |
|
|
|a GBV_ILN_4317
|
912 |
|
|
|a GBV_ILN_4318
|
912 |
|
|
|a GBV_ILN_4319
|
912 |
|
|
|a GBV_ILN_4320
|
912 |
|
|
|a GBV_ILN_4324
|
912 |
|
|
|a GBV_ILN_4325
|
912 |
|
|
|a GBV_ILN_4326
|
912 |
|
|
|a GBV_ILN_4367
|
912 |
|
|
|a GBV_ILN_4385
|
912 |
|
|
|a GBV_ILN_4393
|
912 |
|
|
|a GBV_ILN_4700
|
912 |
|
|
|a GBV_ILN_2060
|
912 |
|
|
|a ISIL_DE-Lg3
|
912 |
|
|
|a GBV_ILN_2470
|
912 |
|
|
|a ISIL_DE-615
|
912 |
|
|
|a ISIL_DE-F131
|
912 |
|
|
|a ISIL_DE-B1503
|
912 |
|
|
|a ISIL_DE-F197
|
912 |
|
|
|a GBV_ILN_2548
|
912 |
|
|
|a ISIL_DE-H221
|
936 |
f |
i |
|0 (DE-627)1756134707
|a RQ
|b Weltweit
|k Weltweit
|2 fivr
|
936 |
f |
i |
|0 (DE-627)1756135363
|a SC
|b Internationale Sicherheit/Verteidigung
|k Internationale Sicherheit/Verteidigung
|2 fivs
|
936 |
f |
i |
|0 (DE-627)1756136386
|a SI03.02
|b Informationstechnologie
|k Technik
|k Technikzweige
|k Informationstechnologie
|2 fivs
|
938 |
1 |
0 |
|0 (DE-627)1756180598
|0 (DE-615)6608724
|a Global
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756170568
|0 (DE-615)6606610
|a Informations-/Kommunikationstechnologie
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756194920
|0 (DE-615)6603193
|a Nationale Sicherheit
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756211442
|0 (DE-615)6605582
|a Technische Sicherheit
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756190755
|0 (DE-615)6607579
|a Informationsinfrastruktur
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756218552
|0 (DE-615)6600280
|a Vulnerabilität
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)175613944X
|0 (DE-615)6604316
|a Hacken/Hacker
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756186146
|0 (DE-615)6606866
|a Staatlich
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756217629
|0 (DE-615)6600548
|a Abwehr eines Angriffs
|2 fivt
|
938 |
1 |
0 |
|0 (DE-627)1756166420
|0 (DE-615)6602637
|a Effizienz/Effektivität
|2 fivt
|
951 |
|
|
|a AR
|
952 |
|
|
|j 2011
|e 66 (März-April 2011) 2
|h 88-95
|
980 |
|
|
|2 2040
|1 01
|x DE-212
|b 3262715387
|c 00
|f --%%--
|d Z - EU 4
|e --%%--
|j --%%--
|y l01
|z 20-05-11
|
980 |
|
|
|2 2060
|1 01
|x DE-Lg3
|b 326271545X
|c 00
|f --%%--
|d --%%--
|e p
|j --%%--
|y l01
|z 09-01-12
|
980 |
|
|
|2 2060
|1 02
|x DE-Lg3
|b 3262715468
|c 00
|f --%%--
|d --%%--
|e --%%--
|j --%%--
|y l01
|z 28-11-11
|
980 |
|
|
|2 2470
|1 01
|x DE-615
|b 3262715522
|c 00
|f --%%--
|d --%%--
|e p
|j --%%--
|y l01
|z 28-11-11
|
980 |
|
|
|2 2470
|1 02
|x DE-F131
|b 3262715530
|c 00
|f --%%--
|d --%%--
|e l
|j --%%--
|y l02
|z 28-11-11
|
980 |
|
|
|2 2470
|1 03
|x DE-B1503
|b 3262715549
|c 00
|f --%%--
|d --%%--
|e n
|j --%%--
|y l03
|z 28-11-11
|
980 |
|
|
|2 2470
|1 06
|x DE-F197
|b 3262715573
|c 00
|f --%%--
|d --%%--
|e --%%--
|j --%%--
|y l06
|z 28-11-11
|
980 |
|
|
|2 2548
|1 01
|x DE-H221
|b 3262715557
|c 00
|f --%%--
|d --%%--
|e --%%--
|j --%%--
|y l04
|z 28-11-11
|
980 |
|
|
|2 2548
|1 02
|x DE-H221
|b 3262715565
|c 00
|f --%%--
|d --%%--
|e --%%--
|j --%%--
|y l05
|z 28-11-11
|
982 |
|
|
|2 2060
|1 01
|x DE-Lg3
|8 00
|s s
|a Internationale Sicherheit/Verteidigung
|
982 |
|
|
|2 2060
|1 01
|x DE-Lg3
|8 00
|s s
|a Informationstechnologie
|
982 |
|
|
|2 2060
|1 01
|x DE-Lg3
|8 00
|s s
|a Weltweit
|
982 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 00
|s s
|a Global; Informations-/Kommunikationstechnologie; Nationale Sicherheit; Technische Sicherheit; Informationsinfrastruktur; Vulnerabilität; Hacker; Staatlich; Abwehr eines Angriffs; Effizienz/Effektivität
|
982 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 01
|s s
|a Information and communication technology; National security; Technical safety; Information infrastructure; Vulnerability; Hackers; Governmental; Repulsion of attacks; Efficiency/Efficacy
|
982 |
|
|
|2 2470
|1 01
|x DE-615
|8 00
|s s
|a Global; Informations-/Kommunikationstechnologie; Nationale Sicherheit; Technische Sicherheit; Informationsinfrastruktur; Vulnerabilität; Hacker; Staatlich; Abwehr eines Angriffs; Effizienz/Effektivität
|
982 |
|
|
|2 2470
|1 01
|x DE-615
|8 01
|s s
|a Information and communication technology; National security; Technical safety; Information infrastructure; Vulnerability; Hackers; Governmental; Repulsion of attacks; Efficiency/Efficacy
|
983 |
|
|
|2 2060
|1 01
|x DE-Lg3
|8 00
|a SC
|
983 |
|
|
|2 2060
|1 01
|x DE-Lg3
|8 01
|a SI03.02
|
983 |
|
|
|2 2060
|1 01
|x DE-Lg3
|8 02
|a RQ
|
983 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 00
|a SC Internationale Sicherheit/Verteidigung
|
983 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 01
|a SI03.02 Informationstechnologie
|
983 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 02
|a RQ Weltweit
|
983 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 03
|a SC International security/Defense
|
983 |
|
|
|2 2060
|1 02
|x DE-Lg3
|8 04
|a SI03.02 Information technology
|
983 |
|
|
|2 2470
|1 01
|x DE-615
|8 00
|a SC Internationale Sicherheit/Verteidigung
|
983 |
|
|
|2 2470
|1 01
|x DE-615
|8 01
|a SI03.02 Informationstechnologie
|
983 |
|
|
|2 2470
|1 01
|x DE-615
|8 02
|a RQ Weltweit
|
983 |
|
|
|2 2470
|1 01
|x DE-615
|8 03
|a SC International security/Defense
|
983 |
|
|
|2 2470
|1 01
|x DE-615
|8 04
|a SI03.02 Information technology
|