54.38 Computersicherheit
Hier: Datensicherheit Siehe: Datenschutz → 86.55 (Datenschutzrecht)
== 2014 (1) == * Glenn Greenwald (2014) **Die globale Überwachung : der Fall Snowden, die amerikanischen Geheimdienste und die Folgen**. Droemer Knaur. München., //ISBN:// [[http://buch.archinform.net/isbn/9783426276358.htm|9783426276358]], //GBV:// [[http://gso.gbv.de/DB=2.1/SET=4/TTL=1/GOO?TRM=54.38|54.38]]-14/00 [[http://www.amazon.de/gp/product/3426276356|web]] ++ bibtex|<code bibtex>@Book{greenwald2014die, author = {Greenwald, Glenn}, title = {Die globale Überwachung : der Fall Snowden, die amerikanischen Geheimdienste und die Folgen}, publisher = {Droemer Knaur}, year = {2014}, address = {München}, isbn = {9783426276358}, lang = {de}, sign = {14/00}, gbv = {54.38}, rvk = {}, url = {http://www.amazon.de/gp/product/3426276356}, thumb = {http://ecx.images-amazon.com/images/I/611qCGKyy2L.jpg} }</code>++ == 2010 (1) == * Jens Kubieziel (2010) **Anonym im Netz wie Sie sich und Ihre Daten schützen**. Open Source Press. München., //ISBN:// [[http://buch.archinform.net/isbn/9783937514956.htm|9783937514956]], //GBV:// [[http://gso.gbv.de/DB=2.1/SET=4/TTL=1/GOO?TRM=54.38|54.38]] [[https://www.opensourcepress.de/index.php?26&tt_products=282|web]] ++ bibtex|<code bibtex>@Book{kubieziel2010anonym, author = {Kubieziel, Jens}, title = {Anonym im Netz wie Sie sich und Ihre Daten schützen}, publisher = {Open Source Press}, year = {2010}, address = {München}, isbn = {9783937514956}, lang = {de}, sign = {}, gbv = {54.38}, rvk = {}, url = {https://www.opensourcepress.de/index.php?26&tt_products=282}, thumb = {https://www.opensourcepress.de/typo3temp/pics/54d6f4fb68.png}, wishlist = {yes} }</code>++ == 2002 (1) == * Josef Brunner (2002) **Linux security : Sicherheit unter Linux mit Open-Source-Tools**. Addison-Wesley. München Boston u.a., //ISBN:// [[http://buch.archinform.net/isbn/9783827319999.htm|9783827319999]], //GBV:// [[http://gso.gbv.de/DB=2.1/SET=4/TTL=1/GOO?TRM=54.38|54.38]]-11/00048, //RVK:// ST 261 L76 [[http://www.addison-wesley.de/3827319994.html|web]] ++ bibtex|<code bibtex>@Book{brunner2002linux, author = {Brunner, Josef}, title = {Linux security : Sicherheit unter Linux mit Open-Source-Tools}, publisher = {Addison-Wesley}, year = {2002}, address = {München Boston u.a}, isbn = {9783827319999}, lang = {de}, sign = {11/00048}, gbv = {54.38}, rvk = {ST 261 L76}, url = {http://www.addison-wesley.de/3827319994.html}, thumb = {http://www.addison-wesley.de/media_local/shop_u1thumbs_3D/9783827319999.jpg} }</code>++ == 2001 (1) == * Elizabeth Zwicky (2001) **Einrichten von Internet firewalls : [behandelt Unix, Linux und Windows NT**. O'Reilly. Beijing Cambridge Farnham Köln Paris Sebastopol Teipei Tokyo., //ISBN:// [[http://buch.archinform.net/isbn/9783897211698.htm|9783897211698]], //GBV:// [[http://gso.gbv.de/DB=2.1/SET=4/TTL=1/GOO?TRM=54.38|54.38]]-11/00075, //RVK:// ST 276 Z98 [[http://www.oreilly.de/catalog/fire2ger/#top|web]] ++ bibtex|<code bibtex>@Book{zwicky2001internet-firewalls, author = {Zwicky, Elizabeth}, title = {Einrichten von Internet firewalls : [behandelt Unix, Linux und Windows NT}, publisher = {O'Reilly}, year = {2001}, address = {Beijing Cambridge Farnham Köln Paris Sebastopol Teipei Tokyo}, isbn = {9783897211698}, lang = {de}, sign = {11/00075}, gbv = {54.38}, rvk = {ST 276 Z98}, url = {http://www.oreilly.de/catalog/fire2ger/#top}, thumb = {http://www.oreilly.de/catalog/covers/fire2ger.s.gif} }</code>++ == 2000 (2) == * George Kurtz (2000) **Das Anti-Hacker-Buch : [Schwachstellen entdecken, Angriffstechniken durchschauen, Gegenmassnahmen ergreifen]**. Mitp. Bonn., //ISBN:// [[http://buch.archinform.net/isbn/9783826640728.htm|9783826640728]], //GBV:// [[http://gso.gbv.de/DB=2.1/SET=4/TTL=1/GOO?TRM=54.38|54.38]]-11/00050, //RVK:// ST 276 M128 ++ bibtex|<code bibtex>@Book{kurtz2000anti-hacker-buch, author = {Kurtz, George}, title = {Das Anti-Hacker-Buch : [Schwachstellen entdecken, Angriffstechniken durchschauen, Gegenmassnahmen ergreifen]}, publisher = {Mitp}, year = {2000}, address = {Bonn}, isbn = {9783826640728}, lang = {de}, sign = {11/00050}, gbv = {54.38}, rvk = {ST 276 M128}, url = {}, thumb = {http://ecx.images-amazon.com/images/I/214GFD92H9L._SL500_AA300_.jpg} }</code>++ * anonymous (2000) **Linux hacker's guide**. Markt-und-Technik-Verl. München., //ISBN:// [[http://buch.archinform.net/isbn/9783827256225.htm|9783827256225]], //GBV:// [[http://gso.gbv.de/DB=2.1/SET=4/TTL=1/GOO?TRM=54.38|54.38]]-11/00049, //RVK:// ST 261 L33 [[http://www.pro-linux.de/artikel/2/172/linux-hacker39s-guide.html|web]] ++ bibtex|<code bibtex>@Book{anonymous2000linux, author = {anonymous}, title = {Linux hacker's guide}, publisher = {Markt-und-Technik-Verl}, year = {2000}, address = {München}, isbn = {9783827256225}, lang = {de}, sign = {11/00049}, gbv = {54.38}, rvk = {ST 261 L33}, url = {http://www.pro-linux.de/artikel/2/172/linux-hacker39s-guide.html}, thumb = {http://www.pro-linux.de/images/NB3/imgdb/o_hackersguide_small-linux-hacker.jpg} }</code>++
BibTeX Daten: gbv5438.bib
Katalog: