Exploiting software: how to break code
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston
Addison-Wesley
2004
|
Ausgabe: | 1. pr. |
Schlagworte: | |
Online-Zugang: | Table of contents |
Beschreibung: | XXXV, 471 S. Ill. |
ISBN: | 0201786958 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV017701181 | ||
003 | DE-604 | ||
005 | 20060130 | ||
007 | t | ||
008 | 031202s2004 xxua||| |||| 00||| eng d | ||
010 | |a 2003025556 | ||
020 | |a 0201786958 |9 0-201-78695-8 | ||
035 | |a (OCoLC)53793558 | ||
035 | |a (DE-599)BVBBV017701181 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-523 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Hoglund, Greg |e Verfasser |0 (DE-588)130649589 |4 aut | |
245 | 1 | 0 | |a Exploiting software |b how to break code |c Greg Hoglund ; Gary McGraw |
250 | |a 1. pr. | ||
264 | 1 | |a Boston |b Addison-Wesley |c 2004 | |
300 | |a XXXV, 471 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Angriff |2 swd | |
650 | 7 | |a Computersicherheit |2 swd | |
650 | 4 | |a Cyberterrorisme | |
650 | 7 | |a Datensicherung |2 swd | |
650 | 7 | |a Datenverarbeitungssystem |2 swd | |
650 | 7 | |a Exploit |2 swd | |
650 | 4 | |a Pirates informatiques | |
650 | 7 | |a Software |2 swd | |
650 | 7 | |a Softwareschwachstelle |2 swd | |
650 | 4 | |a Sécurité informatique | |
650 | 7 | |a Testen |2 swd | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer software |x Testing | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschutz |0 (DE-588)4131649-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 1 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 1 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a McGraw, Gary |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0411/2003025556.html |3 Table of contents | |
999 | |a oai:aleph.bib-bvb.de:BVB01-010642170 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804130432228261888 |
---|---|
any_adam_object | |
author | Hoglund, Greg |
author_GND | (DE-588)130649589 |
author_facet | Hoglund, Greg |
author_role | aut |
author_sort | Hoglund, Greg |
author_variant | g h gh |
building | Verbundindex |
bvnumber | BV017701181 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)53793558 (DE-599)BVBBV017701181 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. pr. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02317nam a2200697zc 4500</leader><controlfield tag="001">BV017701181</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060130 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">031202s2004 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2003025556</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201786958</subfield><subfield code="9">0-201-78695-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53793558</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017701181</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-523</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hoglund, Greg</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130649589</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploiting software</subfield><subfield code="b">how to break code</subfield><subfield code="c">Greg Hoglund ; Gary McGraw</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. pr.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXV, 471 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Angriff</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Exploit</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Testen</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McGraw, Gary</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0411/2003025556.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010642170</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV017701181 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:20:56Z |
institution | BVB |
isbn | 0201786958 |
language | English |
lccn | 2003025556 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010642170 |
oclc_num | 53793558 |
open_access_boolean | |
owner | DE-523 |
owner_facet | DE-523 |
physical | XXXV, 471 S. Ill. |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Hoglund, Greg Verfasser (DE-588)130649589 aut Exploiting software how to break code Greg Hoglund ; Gary McGraw 1. pr. Boston Addison-Wesley 2004 XXXV, 471 S. Ill. txt rdacontent n rdamedia nc rdacarrier Angriff swd Computersicherheit swd Cyberterrorisme Datensicherung swd Datenverarbeitungssystem swd Exploit swd Pirates informatiques Software swd Softwareschwachstelle swd Sécurité informatique Testen swd Computer hackers Computer security Computer software Testing Datensicherung (DE-588)4011144-1 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Softwareschutz (DE-588)4131649-6 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Software (DE-588)4055382-6 s Softwareschutz (DE-588)4131649-6 s DE-604 Hacker (DE-588)4113821-1 s Datensicherung (DE-588)4011144-1 s Computerkriminalität (DE-588)4010452-7 s 1\p DE-604 McGraw, Gary Sonstige oth http://www.loc.gov/catdir/toc/ecip0411/2003025556.html Table of contents 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hoglund, Greg Exploiting software how to break code Angriff swd Computersicherheit swd Cyberterrorisme Datensicherung swd Datenverarbeitungssystem swd Exploit swd Pirates informatiques Software swd Softwareschwachstelle swd Sécurité informatique Testen swd Computer hackers Computer security Computer software Testing Datensicherung (DE-588)4011144-1 gnd Hacker (DE-588)4113821-1 gnd Software (DE-588)4055382-6 gnd Softwareschutz (DE-588)4131649-6 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4113821-1 (DE-588)4055382-6 (DE-588)4131649-6 (DE-588)4010452-7 |
title | Exploiting software how to break code |
title_auth | Exploiting software how to break code |
title_exact_search | Exploiting software how to break code |
title_full | Exploiting software how to break code Greg Hoglund ; Gary McGraw |
title_fullStr | Exploiting software how to break code Greg Hoglund ; Gary McGraw |
title_full_unstemmed | Exploiting software how to break code Greg Hoglund ; Gary McGraw |
title_short | Exploiting software |
title_sort | exploiting software how to break code |
title_sub | how to break code |
topic | Angriff swd Computersicherheit swd Cyberterrorisme Datensicherung swd Datenverarbeitungssystem swd Exploit swd Pirates informatiques Software swd Softwareschwachstelle swd Sécurité informatique Testen swd Computer hackers Computer security Computer software Testing Datensicherung (DE-588)4011144-1 gnd Hacker (DE-588)4113821-1 gnd Software (DE-588)4055382-6 gnd Softwareschutz (DE-588)4131649-6 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Angriff Computersicherheit Cyberterrorisme Datensicherung Datenverarbeitungssystem Exploit Pirates informatiques Software Softwareschwachstelle Sécurité informatique Testen Computer hackers Computer security Computer software Testing Hacker Softwareschutz Computerkriminalität |
url | http://www.loc.gov/catdir/toc/ecip0411/2003025556.html |
work_keys_str_mv | AT hoglundgreg exploitingsoftwarehowtobreakcode AT mcgrawgary exploitingsoftwarehowtobreakcode |