The hacker's handbook: the strategy behind breaking into and defending Networks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2004
|
Schlagworte: | |
Beschreibung: | XXXIV, 860 S. graph. Darst. |
ISBN: | 0849308887 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV017320970 | ||
003 | DE-604 | ||
005 | 20040209 | ||
007 | t | ||
008 | 030715s2004 xxud||| |||| 00||| eng d | ||
010 | |a 2003055391 | ||
020 | |a 0849308887 |9 0-8493-0888-7 | ||
035 | |a (OCoLC)52553884 | ||
035 | |a (DE-599)BVBBV017320970 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
100 | 1 | |a Young, Susan Elizabeth |e Verfasser |4 aut | |
245 | 1 | 0 | |a The hacker's handbook |b the strategy behind breaking into and defending Networks |c Susan Young, Dave Aitel |
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2004 | |
300 | |a XXXIV, 860 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Aitel, Dave |e Sonstige |4 oth | |
999 | |a oai:aleph.bib-bvb.de:BVB01-010441223 |
Datensatz im Suchindex
_version_ | 1804130160090284032 |
---|---|
any_adam_object | |
author | Young, Susan Elizabeth |
author_facet | Young, Susan Elizabeth |
author_role | aut |
author_sort | Young, Susan Elizabeth |
author_variant | s e y se sey |
building | Verbundindex |
bvnumber | BV017320970 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 273 |
classification_tum | DAT 461f DAT 055f DAT 050f |
ctrlnum | (OCoLC)52553884 (DE-599)BVBBV017320970 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01752nam a2200541zc 4500</leader><controlfield tag="001">BV017320970</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040209 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030715s2004 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2003055391</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0849308887</subfield><subfield code="9">0-8493-0888-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52553884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017320970</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Young, Susan Elizabeth</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The hacker's handbook</subfield><subfield code="b">the strategy behind breaking into and defending Networks</subfield><subfield code="c">Susan Young, Dave Aitel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIV, 860 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aitel, Dave</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010441223</subfield></datafield></record></collection> |
id | DE-604.BV017320970 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:16:37Z |
institution | BVB |
isbn | 0849308887 |
language | English |
lccn | 2003055391 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010441223 |
oclc_num | 52553884 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XXXIV, 860 S. graph. Darst. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | CRC Press |
record_format | marc |
spelling | Young, Susan Elizabeth Verfasser aut The hacker's handbook the strategy behind breaking into and defending Networks Susan Young, Dave Aitel Boca Raton, FL CRC Press 2004 XXXIV, 860 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computerbeveiliging gtt Computer hackers Computer networks Access control Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Hacker (DE-588)4113821-1 s Rechnernetz (DE-588)4070085-9 s Sicherheit (DE-588)4054790-5 s Aitel, Dave Sonstige oth |
spellingShingle | Young, Susan Elizabeth The hacker's handbook the strategy behind breaking into and defending Networks Computerbeveiliging gtt Computer hackers Computer networks Access control Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4054790-5 (DE-588)4070085-9 (DE-588)4113821-1 |
title | The hacker's handbook the strategy behind breaking into and defending Networks |
title_auth | The hacker's handbook the strategy behind breaking into and defending Networks |
title_exact_search | The hacker's handbook the strategy behind breaking into and defending Networks |
title_full | The hacker's handbook the strategy behind breaking into and defending Networks Susan Young, Dave Aitel |
title_fullStr | The hacker's handbook the strategy behind breaking into and defending Networks Susan Young, Dave Aitel |
title_full_unstemmed | The hacker's handbook the strategy behind breaking into and defending Networks Susan Young, Dave Aitel |
title_short | The hacker's handbook |
title_sort | the hacker s handbook the strategy behind breaking into and defending networks |
title_sub | the strategy behind breaking into and defending Networks |
topic | Computerbeveiliging gtt Computer hackers Computer networks Access control Computer networks Security measures Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd Rechnernetz (DE-588)4070085-9 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | Computerbeveiliging Computer hackers Computer networks Access control Computer networks Security measures Computersicherheit Sicherheit Rechnernetz Hacker |
work_keys_str_mv | AT youngsusanelizabeth thehackershandbookthestrategybehindbreakingintoanddefendingnetworks AT aiteldave thehackershandbookthestrategybehindbreakingintoanddefendingnetworks |