LEADER 01590nam 2200481 450 001 996472067503316 005 20221114013648.0 010 $a3-030-91293-0 035 $a(MiAaPQ)EBC6945294 035 $a(Au-PeEL)EBL6945294 035 $a(CKB)21459582900041 035 $a(PPN)262167921 035 $a(EXLCZ)9921459582900041 100 $a20221114d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCyber security $ecritical infrastructure protection /$fMartti Lehto, Pekka Neittaanma?ki, editors 210 1$aCham, Switzerland :$cSpringer Nature Switzerland AG,$d[2022] 210 4$dİ2022 215 $a1 online resource (487 pages) 225 1 $aComputational methods in applied sciences ;$vVolume 56 311 08$aPrint version: Lehto, Martti Cyber Security Cham : Springer International Publishing AG,c2022 9783030912925 320 $aIncludes bibliographical references. 410 0$aComputational methods in applied sciences ;$vVolume 56. 606 $aCooperating objects (Computer systems) 606 $aData protection 606 $aComputer crimes 615 0$aCooperating objects (Computer systems) 615 0$aData protection. 615 0$aComputer crimes. 676 $a364.168 702 $aNeittaanma?ki$b P$g(Pekka), 702 $aLehto$b Martti 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996472067503316 996 $aCyber Security$91897917 997 $aUNISA