|
|
|
|
LEADER |
00000caa a2200000 4500 |
001 |
1640170774 |
003 |
DE-627 |
005 |
20230426081157.0 |
007 |
tu |
008 |
140821s2014 xx ||||| 00| ||eng c |
035 |
|
|
|a (DE-627)1640170774
|
035 |
|
|
|a (DE-576)412071703
|
035 |
|
|
|a (DE-599)BSZ412071703
|
035 |
|
|
|a (DE-615)00900214
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
084 |
|
|
|a RQ
|2 fivr
|
084 |
|
|
|a SF06.02
|2 fivs
|
100 |
1 |
|
|0 (DE-588)134247833
|0 (DE-627)565615599
|0 (DE-576)278546609
|4 aut
|a Hof, Hans-Joachim
|d 1975-
|
109 |
|
|
|a Hof, Hans-Joachim 1975-
|
245 |
1 |
0 |
|a Practical limitations of technical privacy protection
|b on the current state of IT security mechanisms used for privacy protection in the field
|c Hans-Joachim Hof
|
264 |
|
1 |
|c 2014
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
773 |
0 |
8 |
|i In
|t Datenschutz und Datensicherheit
|d Wiesbaden : Springer Gabler, 1997
|g 38(2014), 9, Seite 601-605
|w (DE-627)524524017
|w (DE-600)2270716-5
|w (DE-576)262025876
|x 1614-0702
|7 nnns
|
773 |
1 |
8 |
|g volume:38
|g year:2014
|g number:9
|g pages:601-605
|
936 |
f |
i |
|0 (DE-627)1756134707
|a RQ
|b Weltweit
|k Weltweit
|2 fivr
|
936 |
f |
i |
|0 (DE-627)1756135835
|a SF06.02
|b Terrorismus
|k Staat
|k Innere Sicherheit/Innerstaatlicher Konflikt
|k Terrorismus
|2 fivs
|
951 |
|
|
|a AR
|
ACO |
|
|
|a 1
|
ELC |
|
|
|b 1
|
ORI |
|
|
|a SA-MARC-ixtheob001.raw
|
REL |
|
|
|a 1
|
SPR |
|
|
|a 1
|t IXT
|t REL
|
SUB |
|
|
|a REL
|