mdmFacet
Apr May 2024 Jun
MoTuWeThFrSaSu
   1  2  3  4  5
  6  7  8  9101112
13141516171819
20212223242526
2728293031 

Detail

EuropeanaInformation 
Raw data [ X ]
<section name="raw">
    <SEQUENTIAL>
      <record key="001" att1="001" value="LIB905699804" att2="LIB905699804">001   LIB905699804</record>
      <field key="037" subkey="x">englisch</field>
      <field key="050" subkey="x">Buch</field>
      <field key="076" subkey="">EDV</field>
      <field key="079" subkey="y">https://books.google.at/books?id=eYPgBwAAQBAJ&amp;printsec=frontcover</field>
      <field key="079" subkey="z">leiss, ernst l., principles of data security (google book search, limited preview)</field>
      <field key="100" subkey="">leiss, ernst l.</field>
      <field key="103" subkey="">university of houston, texas</field>
      <field key="331" subkey="">principles of data security</field>
      <field key="403" subkey="">1. ed.</field>
      <field key="410" subkey="">new york, london</field>
      <field key="412" subkey="">plenum press</field>
      <field key="425" subkey="">1982</field>
      <field key="433" subkey="">x, 227 pp.</field>
      <field key="451" subkey="">foundations of computer science</field>
      <field key="451" subkey="h">miller, raymond e. (ed.)</field>
      <field key="517" subkey="c">from the table of contents: preface; data security: introduction and motivation; statistical database security; authorization</field>
      <field key="mec" subkey="h">anisms; cryptosystems;</field>
      <field key="540" subkey="">0-306-41098-2</field>
      <field key="544" subkey="">10869-A</field>
      <field key="700" subkey="b">001</field>
      <field key="700" subkey="b">knowledge</field>
      <field key="710" subkey="">computers -- access control</field>
      <field key="710" subkey="">data protection</field>
      <field key="710" subkey="">electronic data processing departments -- security measures</field>
    </SEQUENTIAL>
  </section>
Servertime: 0.409 sec | Clienttime: sec