Gray hat hacking: the ethical hacker's handbook
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
2008
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Autorenbiografie Beschreibung für Lesegruppen Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XXIV, 550 S. Ill., graph. Darst. |
ISBN: | 0071495681 9780071495684 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023535319 | ||
003 | DE-604 | ||
005 | 20100519 | ||
007 | t | ||
008 | 080401s2008 xxuad|| |||| 00||| eng d | ||
020 | |a 0071495681 |c (pbk) : £ 28,99 |9 0-07-149568-1 | ||
020 | |a 9780071495684 |c (pbk) : £ 28,99 |9 978-0-07-149568-4 | ||
035 | |a (OCoLC)254885225 | ||
035 | |a (DE-599)BVBBV023535319 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-521 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Gray hat hacking |b the ethical hacker's handbook |c Stan Harris ... |
250 | |a 2. ed. | ||
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 2008 | |
300 | |a XXIV, 550 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer hackers | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Harris, Shon |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0805/2007047838-b.html |3 Autorenbiografie | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0805/2007047838-d.html |3 Beschreibung für Lesegruppen | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0805/2007047838-t.html |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016824395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016824395 |
Datensatz im Suchindex
_version_ | 1804138140496035840 |
---|---|
adam_text | IMAGE 1
INTRODUCTION TO ETHICAL DISCLOSURE
ETHICS OF ETHICAL HACKING ETHICAL HACKING AND THE LEGAL SYSTEM PROPER
AND ETHICAL DISCLOSURE PENETRATION TESTING AND TOOLS USING METASPLOIT
USING THE BACKTRACK LIVECD LINUX DISTRIBUTION EXPLOITS 101 PROGRAMMING
SURVIVAL SKILLS BASIC LINUX EXPLOITS ADVANCED LINUX EXPLOITS SHELLCODE
STRATEGIES WRITING LINUX SHELLCODE BASIC WINDOWS EXPLOITS VULNERABILITY
ANALYSIS PASSIVE ANALYSIS ADVANCED STATIC ANALYSIS WITH IDA PRO ADVANCED
REVERSE ENGINEERING CLIENT-SIDE BROWSER EXPLOITS EXPLOITING WINDOWS
ACCESS CONTROL MODEL FOR LOCAL ELEVATION OF PRIVILEGE INTELLIGENT
FUZZING WITH SULLEY FROM VULNERABILITY TO EXPLOIT CLOSING THE HOLES:
MITIGATION MALWARE ANALYSIS COLLECTING MALWARE AND INITIAL ANALYSIS
HACKING MALWARE INDEX TABLE OF CONTENTS PROVIDED BY BLACKWELL S BOOK
SERVICES AND R.R. BOWKER. USED WITH PERMISSION.
|
adam_txt |
IMAGE 1
INTRODUCTION TO ETHICAL DISCLOSURE
ETHICS OF ETHICAL HACKING ETHICAL HACKING AND THE LEGAL SYSTEM PROPER
AND ETHICAL DISCLOSURE PENETRATION TESTING AND TOOLS USING METASPLOIT
USING THE BACKTRACK LIVECD LINUX DISTRIBUTION EXPLOITS 101 PROGRAMMING
SURVIVAL SKILLS BASIC LINUX EXPLOITS ADVANCED LINUX EXPLOITS SHELLCODE
STRATEGIES WRITING LINUX SHELLCODE BASIC WINDOWS EXPLOITS VULNERABILITY
ANALYSIS PASSIVE ANALYSIS ADVANCED STATIC ANALYSIS WITH IDA PRO ADVANCED
REVERSE ENGINEERING CLIENT-SIDE BROWSER EXPLOITS EXPLOITING WINDOWS
ACCESS CONTROL MODEL FOR LOCAL ELEVATION OF PRIVILEGE INTELLIGENT
FUZZING WITH SULLEY FROM VULNERABILITY TO EXPLOIT CLOSING THE HOLES:
MITIGATION MALWARE ANALYSIS COLLECTING MALWARE AND INITIAL ANALYSIS
HACKING MALWARE INDEX TABLE OF CONTENTS PROVIDED BY BLACKWELL'S BOOK
SERVICES AND R.R. BOWKER. USED WITH PERMISSION. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV023535319 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)254885225 (DE-599)BVBBV023535319 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01827nam a2200457zc 4500</leader><controlfield tag="001">BV023535319</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100519 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080401s2008 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071495681</subfield><subfield code="c">(pbk) : £ 28,99</subfield><subfield code="9">0-07-149568-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071495684</subfield><subfield code="c">(pbk) : £ 28,99</subfield><subfield code="9">978-0-07-149568-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)254885225</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023535319</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-521</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Gray hat hacking</subfield><subfield code="b">the ethical hacker's handbook</subfield><subfield code="c">Stan Harris ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 550 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harris, Shon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0805/2007047838-b.html</subfield><subfield code="3">Autorenbiografie</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0805/2007047838-d.html</subfield><subfield code="3">Beschreibung für Lesegruppen</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0805/2007047838-t.html</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016824395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016824395</subfield></datafield></record></collection> |
id | DE-604.BV023535319 |
illustrated | Illustrated |
index_date | 2024-07-02T22:29:57Z |
indexdate | 2024-07-09T21:23:27Z |
institution | BVB |
isbn | 0071495681 9780071495684 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016824395 |
oclc_num | 254885225 |
open_access_boolean | |
owner | DE-521 |
owner_facet | DE-521 |
physical | XXIV, 550 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Gray hat hacking the ethical hacker's handbook Stan Harris ... 2. ed. New York [u.a.] McGraw-Hill 2008 XXIV, 550 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Computer security Computer hackers Computersicherheit (DE-588)4274324-2 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Hacker (DE-588)4113821-1 s DE-604 Harris, Shon Sonstige oth http://www.loc.gov/catdir/enhancements/fy0805/2007047838-b.html Autorenbiografie http://www.loc.gov/catdir/enhancements/fy0805/2007047838-d.html Beschreibung für Lesegruppen http://www.loc.gov/catdir/enhancements/fy0805/2007047838-t.html Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016824395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Gray hat hacking the ethical hacker's handbook Computer security Computer hackers Computersicherheit (DE-588)4274324-2 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4113821-1 |
title | Gray hat hacking the ethical hacker's handbook |
title_auth | Gray hat hacking the ethical hacker's handbook |
title_exact_search | Gray hat hacking the ethical hacker's handbook |
title_exact_search_txtP | Gray hat hacking the ethical hacker's handbook |
title_full | Gray hat hacking the ethical hacker's handbook Stan Harris ... |
title_fullStr | Gray hat hacking the ethical hacker's handbook Stan Harris ... |
title_full_unstemmed | Gray hat hacking the ethical hacker's handbook Stan Harris ... |
title_short | Gray hat hacking |
title_sort | gray hat hacking the ethical hacker s handbook |
title_sub | the ethical hacker's handbook |
topic | Computer security Computer hackers Computersicherheit (DE-588)4274324-2 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | Computer security Computer hackers Computersicherheit Hacker |
url | http://www.loc.gov/catdir/enhancements/fy0805/2007047838-b.html http://www.loc.gov/catdir/enhancements/fy0805/2007047838-d.html http://www.loc.gov/catdir/enhancements/fy0805/2007047838-t.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016824395&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT harrisshon grayhathackingtheethicalhackershandbook |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis