Search dblp for Publications

export results for "toc:db/journals/hmd/hmd236.bht:"

 download as .bib file

@article{DBLP:journals/hmd/Hildebrand04,
  author       = {Knut Hildebrand},
  title        = {Die 10 Gebote der Informationstechnologie},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/11.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Hildebrand04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Humpert04,
  author       = {Frederik Humpert},
  title        = {IT-Sicherheit},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/01.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Humpert04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/JablonskiMP04a,
  author       = {Stefan Jablonski and
                  Christian Meiler and
                  Ilia Petrov},
  title        = {Integration von Semantic-Web-Konzepten in Web-Content-Managementsysteme},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/10.php},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/JablonskiMP04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Loomans04,
  author       = {Dirk C. Loomans},
  title        = {Information Risk Scorecard macht Unsicherheitskosten transparent},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/04.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Loomans04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/MatousekST04,
  author       = {Michael Matousek and
                  Thomas Schlienger and
                  Stephanie Teufel},
  title        = {Metriken und Konzepte zur Messung der Informationssicherheit},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/03.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/MatousekST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/RauschenD04,
  author       = {Thomas Rauschen and
                  Georg Disterer},
  title        = {Identifikation und Analyse von Risiken im IT-Bereich},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/02.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/RauschenD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Riedl04,
  author       = {Reinhard Riedl},
  title        = {Sicherheit im E-Government},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/06.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Riedl04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Schreiber04,
  author       = {Sebastian Schreiber},
  title        = {Hackertools und Penetrationstest},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/07.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Schreiber04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Strobel04,
  author       = {Stefan Strobel},
  title        = {Intrusion Detection und Intrusion Prevention},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/09.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Strobel04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Thiel04,
  author       = {Christoph Thiel},
  title        = {Ein Reifegradmodell f{\"{u}}r das IT-Sicherheitsmanagement},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/05.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Thiel04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hmd/Wurster04,
  author       = {Falk Wurster},
  title        = {Ein Werkzeug f{\"{u}}r Angriffsb{\"{a}}ume},
  journal      = {{HMD} Prax. Wirtsch.},
  volume       = {236},
  year         = {2004},
  url          = {http://www.dpunkt.de/hmdissues/236/08.php},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hmd/Wurster04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics