Digital Transformation in Policing: The Promise, Perils and Solutions / edited by Reza Montasari, Victoria Carpenter, Anthony J. Masys
Digitizing Policing: from disruption to innovation through futures thinking and anticipatory innovation -- The Use of Counter Narratives to Combat Violent Extremism Online -- Ethical Challenges in the Use of Digital Technologies: AI and Big Data -- Law Enforcement and the Policing of Cyberspace -- Contemporary Issues in Child Protection: Police Use of Artificial Intelligence for Online Child Protection in the UK -- Beyond the Surface Web: How Criminals Are Utilising the Internet to Commit Crimes -- The Role of the Internet in Radicalisation to Violent Extremism -- Exploring the Extent to Which Extremism and Terrorism Have Changed since the Advent of the Internet -- Zero Trust Security Strategies and Guideline. ..
This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture. This book presents concepts, theories and digital policing applications, offering a comprehensive analysis of current and emerging trends in digital policing. Pursuing an evidence-based approach, it offers an extraordinarily perceptive and detailed view of issues and solutions regarding the crime and digital policing landscape. To this end, it highlights current technological and methodological solutions as well as advances concerning integrated computational and analytical solutions deployed in digital policing. It also provides a comprehensive analysis of the technical, ethical, legal, privacy and civil liberty challenges stemming from the aforementioned advances in the field of digital policing; and accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical and legal approaches when conducting digital policing. The research gathered here fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime and law. It provides a valuable reference for law enforcement, policymakers, cybersecurity experts, digital forensic practitioners, researchers, graduates and advanced undergraduates, and other stakeholders with an interest in counter-terrorism. In addition to this target audience, it offers a valuable tool for lawyers, criminologist and technology enthusiasts..
Medienart: |
E-Book |
---|
Erscheinungsjahr: |
2023. |
---|---|
Erschienen: |
Cham: Springer International Publishing ; 2023. Cham: Imprint: Springer ; 2023. |
Ausgabe: |
1st ed. 2023. |
Weitere Ausgaben: |
Erscheint auch als Druck-Ausgabe: Digital transformation in policing |
---|
Reihe: |
Advanced Sciences and Technologies for Security Applications |
---|
Sprache: |
Englisch |
---|
Beteiligte Personen: |
Montasari, Reza [HerausgeberIn] |
---|
Links: |
doi.org [lizenzpflichtig] |
---|
ISBN: |
---|
Umfang: |
1 Online-Ressource(V, 168 p. 21 illus., 17 illus. in color.) |
---|
doi: |
10.1007/978-3-031-09691-4 |
---|
funding: |
|
---|---|
Förderinstitution / Projekttitel: |
|
PPN (Katalog-ID): |
1830643789 |
---|
LEADER | 01000cam a22002652 4500 | ||
---|---|---|---|
001 | 1830643789 | ||
003 | DE-627 | ||
005 | 20240107003934.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230110s2023 sz |||||o 00| ||eng c | ||
020 | |a 9783031096914 |9 978-3-031-09691-4 | ||
024 | 7 | |a 10.1007/978-3-031-09691-4 |2 doi | |
035 | |a (DE-627)1830643789 | ||
035 | |a (DE-599)KEP083598340 | ||
035 | |a (DE-He213)978-3-031-09691-4 | ||
035 | |a (EBP)083598340 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-CH | ||
072 | 7 | |a UYQ |2 bicssc | |
072 | 7 | |a COM004000 |2 bisacsh | |
245 | 1 | 0 | |a Digital Transformation in Policing: The Promise, Perils and Solutions |c edited by Reza Montasari, Victoria Carpenter, Anthony J. Masys |
250 | |a 1st ed. 2023. | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2023. | |
264 | 1 | |a Cham |b Imprint: Springer |c 2023. | |
300 | |a 1 Online-Ressource(V, 168 p. 21 illus., 17 illus. in color.) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced Sciences and Technologies for Security Applications | |
520 | |a Digitizing Policing: from disruption to innovation through futures thinking and anticipatory innovation -- The Use of Counter Narratives to Combat Violent Extremism Online -- Ethical Challenges in the Use of Digital Technologies: AI and Big Data -- Law Enforcement and the Policing of Cyberspace -- Contemporary Issues in Child Protection: Police Use of Artificial Intelligence for Online Child Protection in the UK -- Beyond the Surface Web: How Criminals Are Utilising the Internet to Commit Crimes -- The Role of the Internet in Radicalisation to Violent Extremism -- Exploring the Extent to Which Extremism and Terrorism Have Changed since the Advent of the Internet -- Zero Trust Security Strategies and Guideline. . | ||
520 | |a This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture. This book presents concepts, theories and digital policing applications, offering a comprehensive analysis of current and emerging trends in digital policing. Pursuing an evidence-based approach, it offers an extraordinarily perceptive and detailed view of issues and solutions regarding the crime and digital policing landscape. To this end, it highlights current technological and methodological solutions as well as advances concerning integrated computational and analytical solutions deployed in digital policing. It also provides a comprehensive analysis of the technical, ethical, legal, privacy and civil liberty challenges stemming from the aforementioned advances in the field of digital policing; and accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical and legal approaches when conducting digital policing. The research gathered here fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime and law. It provides a valuable reference for law enforcement, policymakers, cybersecurity experts, digital forensic practitioners, researchers, graduates and advanced undergraduates, and other stakeholders with an interest in counter-terrorism. In addition to this target audience, it offers a valuable tool for lawyers, criminologist and technology enthusiasts. | ||
650 | 0 | |a Artificial intelligence—Data processing. | |
650 | 0 | |a Technology—Moral and ethical aspects. | |
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Security systems. | |
650 | 0 | |a Criminology. | |
650 | 0 | |a Technology | |
650 | 0 | |a Artificial intelligence | |
655 | 7 | |a Aufsatzsammlung |0 (DE-588)4143413-4 |0 (DE-627)105605727 |0 (DE-576)209726091 |2 gnd-content | |
689 | 0 | 0 | |D s |0 (DE-588)4046595-0 |0 (DE-627)106197525 |0 (DE-576)209070196 |a Polizei |2 gnd |
689 | 0 | 1 | |D s |0 (DE-588)4059252-2 |0 (DE-627)106144103 |0 (DE-576)209130083 |a Technischer Fortschritt |2 gnd |
689 | 0 | 2 | |D s |0 (DE-588)4033447-8 |0 (DE-627)106257188 |0 (DE-576)209002050 |a Künstliche Intelligenz |2 gnd |
689 | 0 | 3 | |D s |0 (DE-588)4774034-6 |0 (DE-627)384639607 |0 (DE-576)216262739 |a Computerforensik |2 gnd |
689 | 0 | 4 | |D s |0 (DE-588)4274324-2 |0 (DE-627)104467525 |0 (DE-576)21070585X |a Computersicherheit |2 gnd |
689 | 0 | 5 | |D s |0 (DE-588)4127888-4 |0 (DE-627)105721344 |0 (DE-576)209597410 |a Innere Sicherheit |2 gnd |
689 | 0 | 6 | |D s |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
689 | 0 | 7 | |D s |0 (DE-588)1118882725 |0 (DE-627)872358631 |0 (DE-576)479682461 |a Cyberterrorismus |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Montasari, Reza |e herausgeberin |4 edt | |
700 | 1 | |a Carpenter, Victoria |e herausgeberin |4 edt | |
700 | 1 | |a Masys, Anthony J. |e herausgeberin |4 edt | |
776 | 1 | |z 9783031096907 | |
776 | 1 | |z 9783031096921 | |
776 | 1 | |z 9783031096938 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Digital transformation in policing |d Cham : Springer, 2023 |h v, 168 Seiten |w (DE-627)1817892584 |z 9783031096907 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783031096921 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783031096938 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-09691-4 |m X:SPRINGER |x Resolving-System |z lizenzpflichtig |
912 | |a ZDB-2-SEB |b 2023 | ||
912 | |a ZDB-2-SCS |b 2023 | ||
912 | |a ZDB-2-SXCS |b 2023 | ||
912 | |a GBV_ILN_22 | ||
912 | |a ISIL_DE-18 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a SSG-OLC-PHA | ||
912 | |a GBV_ILN_22_i22818 | ||
912 | |a GBV_ILN_60 | ||
912 | |a ISIL_DE-705 | ||
912 | |a GBV_ILN_62 | ||
912 | |a ISIL_DE-28 | ||
912 | |a GBV_ILN_65 | ||
912 | |a ISIL_DE-3 | ||
912 | |a GBV_ILN_100 | ||
912 | |a ISIL_DE-Ma9 | ||
912 | |a GBV_ILN_101 | ||
912 | |a ISIL_DE-Ma14 | ||
912 | |a GBV_ILN_105 | ||
912 | |a ISIL_DE-841 | ||
912 | |a GBV_ILN_110 | ||
912 | |a ISIL_DE-Luen4 | ||
912 | |a GBV_ILN_120 | ||
912 | |a ISIL_DE-715 | ||
912 | |a GBV_ILN_130 | ||
912 | |a ISIL_DE-700 | ||
912 | |a GBV_ILN_132 | ||
912 | |a ISIL_DE-959 | ||
912 | |a GBV_ILN_161 | ||
912 | |a ISIL_DE-960 | ||
912 | |a GBV_ILN_231 | ||
912 | |a ISIL_DE-527 | ||
912 | |a GBV_ILN_293 | ||
912 | |a ISIL_DE-960-3 | ||
912 | |a GBV_ILN_736 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a ISIL_DE-21 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a ISIL_DE-291 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a ISIL_DE-14 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a ISIL_DE-352E | ||
912 | |a GBV_ILN_2014 | ||
912 | |a ISIL_DE-90 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a ISIL_DE-93 | ||
912 | |a GBV_ILN_2017 | ||
912 | |a ISIL_DE-576 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a ISIL_DE-Ch1 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a ISIL_DE-289 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a ISIL_DE-105 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a ISIL_DE-Rt2 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a ISIL_DE-840 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a ISIL_DE-L189 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a ISIL_DE-520 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a ISIL_DE-944 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a ISIL_DE-943 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a ISIL_DE-941 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a ISIL_DE-Hed2 | ||
951 | |a BO | ||
953 | |2 045F |a 006.3 | ||
980 | |2 22 |1 01 |x 0018 |b 4263061136 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h olrm-h228-scs |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y zi22818 |z 03-02-23 | ||
980 | |2 60 |1 01 |x 0705 |b 4247543539 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |h SpringerLink |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |k Nur für Angehörige der HSU: Volltextzugang von außerhalb des Campus mit Anmeldung über Shibboleth mit Ihrer Bibliothekskennung |y z |z 13-01-23 | ||
980 | |2 62 |1 01 |x 0028 |b 4274036839 |h OLR-Springer-EBS_Computer Science |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |k Temporär im Bestand der UB Rostock |y z |z 17-02-23 | ||
980 | |2 65 |1 01 |x 0003 |b 4248004070 |c 03 |f --%%-- |d ebook |e --%%-- |j --%%-- |h OLR-SEB-ZDB-2-SCS |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Die Weitergabe an Dritte sowie systematisches Downloaden sind untersagt. |y k3o |z 13-01-23 | ||
980 | |2 100 |1 01 |x 3100 |b 4247802518 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |c 09 |f --%%-- |d eBook Springer |e --%%-- |j --%%-- |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 13-01-23 | ||
980 | |2 101 |1 01 |x 3101 |b 4247960512 |c 00 |f --%%-- |d --%%-- |e s |j --%%-- |c 09 |f --%%-- |d eBook Springer |e --%%-- |j --%%-- |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 13-01-23 | ||
980 | |2 105 |1 01 |x 0841 |b 4248022133 |h OLR-ESP |k Campuslizenz Universität / Technische Hochschule Lübeck. - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y x |z 13-01-23 | ||
980 | |2 110 |1 01 |x 3110 |b 4247624024 |h OLR-SEB |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y z |z 13-01-23 | ||
980 | |2 120 |1 01 |x 0715 |b 4250001490 |c 00 |f --%%-- |d --%%-- |e g |j --%%-- |h alma |y z |z 20-01-23 | ||
980 | |2 130 |1 01 |x 0700 |b 4263144546 |h OLR-SEB |k Vervielfältigungen (z. B. Kopien, Downloads) nur für den eigenen wissenschaftlichen Gebrauch. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots |y z |z 03-02-23 | ||
980 | |2 132 |1 01 |x 0959 |b 4247515454 |h OLR-ESP |k Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |y k |z 13-01-23 | ||
980 | |2 161 |1 01 |x 0960 |b 4247499343 |h OLR-SEB |k Campusweiter Zugriff (Hochschule Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |u fhebook |y z |z 12-01-23 | ||
980 | |2 231 |1 01 |x 0527 |b 424753047X |h OLR-SEB |k Ausdruck und Kopien sind ausschließlich für den eigenen wissenschaftlichen Gebrauch gestattet |y z |z 13-01-23 | ||
980 | |2 293 |1 01 |x 3293 |b 4247499645 |h OLR-SEB |k Campusweiter Zugriff (Hochschule Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. |u fhebook |y xf |z 12-01-23 | ||
980 | |2 736 |1 01 |x 4736 |b 4263237048 |h OLR-SEB |u verv |y xeg |z 03-02-23 | ||
980 | |2 2001 |1 01 |x DE-21 |b 424783911X |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l01 |z 13-01-23 | ||
980 | |2 2005 |1 01 |x DE-291 |b 444194635X |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Zugriff nur aus dem Universitätsnetz |y l01 |z 20-12-23 | ||
980 | |2 2006 |1 01 |x DE-14 |b 4245657863 |c 00 |f --%%-- |d --%%-- |e --%%-- |j --%%-- |y l01 |z 10-01-23 | ||
980 | |2 2007 |1 01 |x DE-352E |b 4246567531 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |y l01 |z 12-01-23 | ||
980 | |2 2014 |1 01 |x DE-90 |b 4246215694 |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l01 |z 11-01-23 | ||
980 | |2 2014 |1 02 |x DE-90 |b 4246215708 |c 00 |f --%%-- |d --%%-- |e --%%-- |j kp |y l02 |z 11-01-23 | ||
980 | |2 2015 |1 01 |x DE-93 |b 424565788X |c 00 |f --%%-- |d --%%-- |e p |j --%%-- |k Campuslizenz |y l01 |z 10-01-23 | ||
980 | |2 2017 |1 01 |x DE-576 |b 4245657898 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Besitznachweis BSZ nur für Dateneinspielung, keine echte Lizenz vorhanden |y l01 |z 10-01-23 | ||
980 | |2 2020 |1 01 |x DE-Ch1 |b 4245657901 |c 00 |f --%%-- |d --%%-- |e n |j --%%-- |k Campuslizenz |y l01 |z 10-01-23 | ||
980 | |2 2021 |1 01 |x DE-289 |b 4309316174 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |y l01 |z 17-04-23 | ||
980 | |2 2027 |1 01 |x DE-105 |b 4245648023 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Campuslizenz |y l01 |z 10-01-23 | ||
980 | |2 2034 |1 01 |x DE-Rt2 |b 4245648031 |c 00 |f --%%-- |d eBook |e --%%-- |j n |k Zugriff von allen im Hochschulnetz befindlichen Rechnern; Hochschulangehörige können auch über VPN von außerhalb des Campusnetzes zugreifen |y l01 |z 10-01-23 | ||
980 | |2 2055 |1 01 |x DE-840 |b 4262838838 |c 00 |f --%%-- |d Springer ebook ComputerScience |e --%%-- |j n |k Campuslizenz HHN |y l01 |z 02-02-23 | ||
980 | |2 2057 |1 01 |x DE-L189 |b 424565791X |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |k Campuslizenz |y l01 |z 10-01-23 | ||
980 | |2 2061 |1 01 |x DE-520 |b 4254979126 |c 00 |f --%%-- |d EBS im Sachsenkonsortium |e --%%-- |j n |k eBook, Volltext nur im Campusnetz |y l01 |z 30-01-23 | ||
980 | |2 2111 |1 01 |x DE-944 |b 424595485X |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 11-01-23 | ||
980 | |2 2119 |1 01 |x DE-943 |b 4261159767 |c 00 |f --%%-- |d eBook Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 01-02-23 | ||
980 | |2 2152 |1 01 |x DE-941 |b 424564804X |c 00 |f --%%-- |d E-Book Springer |e --%%-- |j n |y l01 |z 10-01-23 | ||
980 | |2 2153 |1 01 |x DE-Hed2 |b 4245648058 |c 00 |f --%%-- |d e-Book Springer |e --%%-- |j n |k Elektronischer Volltext - Campuslizenz |y l01 |z 10-01-23 | ||
981 | |2 22 |1 01 |x 0018 |y Volltextzugang Campus |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 22 |1 01 |x 0018 |y Nur für Angehörige der Universität Hamburg: Volltextzugang von außerhalb des Campus |r http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 60 |1 01 |x 0705 |y Volltextzugang Campus |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 62 |1 01 |x 0028 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 65 |1 01 |x 0003 |y Volltextzugang Campus |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 100 |1 01 |x 3100 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 100 |1 01 |x 3100 |y für Uniangehörige: Zugang weltweit |r https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 101 |1 01 |x 3101 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 101 |1 01 |x 3101 |y für Uniangehörige: Zugang weltweit |r https://han.med.uni-magdeburg.de/han/SPR-eBook-ComputerScience-einzeln/doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 105 |1 01 |x 0841 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 110 |1 01 |x 3110 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 120 |1 01 |x 0715 |r http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991016054142503501 | ||
981 | |2 130 |1 01 |x 0700 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 132 |1 01 |x 0959 |y Zugriff nur für Angehörige der Hochschule Osnabrück im Hochschulnetz |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 161 |1 01 |x 0960 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 231 |1 01 |x 0527 |y Nutzung ausschließlich für Angehörige der Hochschule Harz |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 293 |1 01 |x 3293 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 736 |1 01 |x 4736 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2001 |1 01 |x DE-21 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2005 |1 01 |x DE-291 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2006 |1 01 |x DE-14 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2007 |1 01 |x DE-352E |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2014 |1 01 |x DE-90 |y Zugang im Netz des KIT |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2014 |1 02 |x DE-90 |y Zugang im Netz der HKA |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2015 |1 01 |x DE-93 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2020 |1 01 |x DE-Ch1 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2021 |1 01 |x DE-289 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2034 |1 01 |x DE-Rt2 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2055 |1 01 |x DE-840 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2057 |1 01 |x DE-L189 |y HTWK-Zugang |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2061 |1 01 |x DE-520 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2111 |1 01 |x DE-944 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2119 |1 01 |x DE-943 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2152 |1 01 |x DE-941 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
981 | |2 2153 |1 01 |x DE-Hed2 |r https://doi.org/10.1007/978-3-031-09691-4 | ||
982 | |2 132 |1 01 |x 0959 |8 00 |a EBooks Springer Computer science | ||
982 | |2 2001 |1 01 |x DE-21 |8 00 |s s |a eBook-Springer-Computer-Science-2023 | ||
982 | |2 2027 |1 01 |x DE-105 |8 00 |s s |a ebook | ||
983 | |2 2111 |1 01 |x DE-944 |8 00 |0 (DE-627)1353370437 |a e-Book | ||
983 | |2 2153 |1 01 |x DE-Hed2 |8 00 |0 (DE-627)1357129785 |a e-Book | ||
983 | |2 2153 |1 01 |x DE-Hed2 |8 00 |0 (DE-627)1830158732 |a eBook Computer Science EBS | ||
995 | |2 22 |1 01 |x 0018 |a olrm-h228-scs | ||
995 | |2 60 |1 01 |x 0705 |a SpringerLink | ||
995 | |2 62 |1 01 |x 0028 |a OLR-Springer-EBS_Computer Science | ||
995 | |2 65 |1 01 |x 0003 |a OLR-SEB-ZDB-2-SCS | ||
995 | |2 100 |1 01 |x 3100 |a OLR-SEB | ||
995 | |2 101 |1 01 |x 3101 |a OLR-SEB | ||
995 | |2 105 |1 01 |x 0841 |a OLR-ESP | ||
995 | |2 110 |1 01 |x 3110 |a OLR-SEB | ||
995 | |2 110 |1 01 |x 3110 |a OLR-SPRINGER-EBS | ||
995 | |2 120 |1 01 |x 0715 |a alma | ||
995 | |2 130 |1 01 |x 0700 |a OLR-SEB | ||
995 | |2 132 |1 01 |x 0959 |a OLR-ESP | ||
995 | |2 132 |1 01 |x 0959 |a OLR-ESP-SCS | ||
995 | |2 161 |1 01 |x 0960 |a OLR-SEB | ||
995 | |2 231 |1 01 |x 0527 |a OLR-SEB | ||
995 | |2 293 |1 01 |x 3293 |a OLR-SEB | ||
995 | |2 736 |1 01 |x 4736 |a OLR-SEB |