<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:community="http://www.bibsonomy.org/ontologies/2008/05/community#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:admin="http://webns.net/mvcb/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" xmlns:cc="http://web.resource.org/cc/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" xmlns:swrc="http://swrc.ontoware.org/ontology#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xml:base="https://puma.ub.uni-stuttgart.de/user/droessler/Computer%20software"><owl:Ontology rdf:about=""><rdfs:comment>PUMA publications for /user/droessler/Computer%20software</rdfs:comment><owl:imports rdf:resource="http://swrc.ontoware.org/ontology/portal"/></owl:Ontology><rdf:Description rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/220ed412086ede754668bc27dda71570d/droessler"><owl:sameAs rdf:resource="/uri/bibtex/220ed412086ede754668bc27dda71570d/droessler"/><rdf:type rdf:resource="http://swrc.ontoware.org/ontology#Book"/><owl:sameAs rdf:resource="http://dx.doi.org/10.1007/978-1-4842-5149-2"/><swrc:date>Wed Feb 16 16:57:26 CET 2022</swrc:date><swrc:address>New York</swrc:address><swrc:note>1 Online-Ressource (IX, 139 Seiten)</swrc:note><swrc:publisher><swrc:Organization swrc:name="Apress"/></swrc:publisher><swrc:series>Springer eBooks. Professional and Applied Computing</swrc:series><swrc:title>Introducing Markdown and Pandoc: using Markup Language and Document Converter</swrc:title><swrc:year>2019</swrc:year><swrc:keywords>Compilers Computer Interpreters Languages Open Programming markdown pandoc programming science scientific software source writing </swrc:keywords><swrc:abstract>1: The Beginner&#039;s Guide to Markdown and Pandoc -- 2: Why Use Markdown and Pandoc -- 3: Writing Markdown -- 4: Pandoc Markdown Extensions -- 5: Translating Documents -- 6: Math and Computer Programming Languages -- 7: Cross-referencing -- 8: Metadata -- 9: Using Templates -- 10: Preprocessing -- 11: Filters -- 12: Conclusions</swrc:abstract><swrc:hasExtraField><swrc:Field swrc:value="9781484251492" swrc:key="isbn"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="Englisch" swrc:key="language"/></swrc:hasExtraField><swrc:author><rdf:Seq><rdf:_1><swrc:Person swrc:name="Thomas Mailund"/></rdf:_1></rdf:Seq></swrc:author></rdf:Description><rdf:Description rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/2c88eb3ee8131d3b59ae26da22f478b81/droessler"><owl:sameAs rdf:resource="/uri/bibtex/2c88eb3ee8131d3b59ae26da22f478b81/droessler"/><rdf:type rdf:resource="http://swrc.ontoware.org/ontology#Article"/><owl:sameAs rdf:resource="https://www.zeit.de/campus/2019-12/cyberangriff-giessen-justus-liebig-universitaet-internet-offline/komplettansicht?print"/><swrc:date>Thu Dec 19 15:50:01 CET 2019</swrc:date><swrc:journal>ZEIT online</swrc:journal><swrc:month>12</swrc:month><swrc:title>Cyberangriff: Gießen ist off </swrc:title><swrc:year>2019</swrc:year><swrc:keywords>cloud computer cyberangriff cybercrime giesen gießen hacker hessenbox it-sicherheit sicherheit software uni </swrc:keywords><swrc:day>17</swrc:day><swrc:author><rdf:Seq><rdf:_1><swrc:Person swrc:name="Carla Baum"/></rdf:_1></rdf:Seq></swrc:author></rdf:Description><rdf:Description rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/23baccbb4c6821be7be734ad05c7a48df/droessler"><owl:sameAs rdf:resource="/uri/bibtex/23baccbb4c6821be7be734ad05c7a48df/droessler"/><rdf:type rdf:resource="http://swrc.ontoware.org/ontology#Article"/><owl:sameAs rdf:resource="http://www.sueddeutsche.de/digital/2.220/it-sicherheit-warum-es-keine-gute-idee-ist-passwoerter-regelmaessig-zu-aendern-1.3106648"/><swrc:date>Wed Aug 03 23:45:26 CEST 2016</swrc:date><swrc:journal>Süddeutsche Zeitung</swrc:journal><swrc:month>08</swrc:month><swrc:title>Warum es keine gute Idee ist, Passwörter regelmäßig zu ändern </swrc:title><swrc:year>2016</swrc:year><swrc:keywords>computer datensicherheit internet passwort passwörter sicherheit software </swrc:keywords><swrc:day>03</swrc:day><swrc:hasExtraField><swrc:Field swrc:value="2016-08-03 11:45:26" swrc:key="timestamp"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="droessler" swrc:key="username"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="3baccbb4c6821be7be734ad05c7a48df" swrc:key="intrahash"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value=":2016-08-03_passwörter.pdf:PDF" swrc:key="file"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="eba9b6a7301d3a60d084a379785454f5" swrc:key="interhash"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="public" swrc:key="groups"/></swrc:hasExtraField><swrc:author><rdf:Seq><rdf:_1><swrc:Person swrc:name="Simon Hurtz"/></rdf:_1></rdf:Seq></swrc:author></rdf:Description></rdf:RDF>