Hacking with Kali: practical penetration testing techniques
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (ix, 227 p.) |
ISBN: | 9780124078833 0124078834 9780124077492 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041783850 | ||
003 | DE-604 | ||
005 | 20191105 | ||
007 | cr|uuu---uuuuu | ||
008 | 140408s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124078833 |c Online |9 978-0-12-407883-3 | ||
020 | |a 0124078834 |c Online |9 0-12-407883-4 | ||
020 | |a 9780124077492 |c Print |9 978-0-12-407749-2 | ||
035 | |a (ZDB-4-EBA)ocn870340083 | ||
035 | |a (ZDB-4-ITC)ocn870340083 | ||
035 | |a (OCoLC)870340083 | ||
035 | |a (DE-599)BVBBV041783850 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Broad, James |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking with Kali |b practical penetration testing techniques |c James Broad, Andrew Bindner |
250 | |a 1st ed | ||
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource (ix, 227 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
630 | 0 | 4 | |a Kali Linux |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 1 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Bindner, Andrew |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://proquest.tech.safaribooksonline.de/9780124077492 |x Verlag |3 Volltext |
912 | |a ZDB-32-STB |a ZDB-4-EBA |a ZDB-4-ITC | ||
940 | 1 | |q FAW_PDA_EBA | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027229618 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105 |l UBY01 |p ZDB-4-ITC |q UBY_PDA_ITC_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152097465171968 |
---|---|
any_adam_object | |
author | Broad, James |
author_facet | Broad, James |
author_role | aut |
author_sort | Broad, James |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV041783850 |
collection | ZDB-32-STB ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn870340083 (ZDB-4-ITC)ocn870340083 (OCoLC)870340083 (DE-599)BVBBV041783850 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01972nmm a2200517zc 4500</leader><controlfield tag="001">BV041783850</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140408s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124078833</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-407883-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124078834</subfield><subfield code="c">Online</subfield><subfield code="9">0-12-407883-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124077492</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-407749-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn870340083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn870340083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)870340083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041783850</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Broad, James</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking with Kali</subfield><subfield code="b">practical penetration testing techniques</subfield><subfield code="c">James Broad, Andrew Bindner</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix, 227 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bindner, Andrew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://proquest.tech.safaribooksonline.de/9780124077492</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027229618</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-ITC</subfield><subfield code="q">UBY_PDA_ITC_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041783850 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:05:18Z |
institution | BVB |
isbn | 9780124078833 0124078834 9780124077492 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027229618 |
oclc_num | 870340083 |
open_access_boolean | |
owner | DE-1046 DE-1047 DE-706 |
owner_facet | DE-1046 DE-1047 DE-706 |
physical | 1 Online-Ressource (ix, 227 p.) |
psigel | ZDB-32-STB ZDB-4-EBA ZDB-4-ITC FAW_PDA_EBA ZDB-4-ITC UBY_PDA_ITC_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Broad, James Verfasser aut Hacking with Kali practical penetration testing techniques James Broad, Andrew Bindner 1st ed Waltham, MA Syngress 2014 1 Online-Ressource (ix, 227 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Kali Linux Penetration testing (Computer security) Computer networks / Security measures Kali Linux (DE-588)1058901281 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Electronic books Penetrationstest (DE-588)4825817-9 s Kali Linux (DE-588)1058901281 s 1\p DE-604 Bindner, Andrew Sonstige oth http://proquest.tech.safaribooksonline.de/9780124077492 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Broad, James Hacking with Kali practical penetration testing techniques Kali Linux Penetration testing (Computer security) Computer networks / Security measures Kali Linux (DE-588)1058901281 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)1058901281 (DE-588)4825817-9 |
title | Hacking with Kali practical penetration testing techniques |
title_auth | Hacking with Kali practical penetration testing techniques |
title_exact_search | Hacking with Kali practical penetration testing techniques |
title_full | Hacking with Kali practical penetration testing techniques James Broad, Andrew Bindner |
title_fullStr | Hacking with Kali practical penetration testing techniques James Broad, Andrew Bindner |
title_full_unstemmed | Hacking with Kali practical penetration testing techniques James Broad, Andrew Bindner |
title_short | Hacking with Kali |
title_sort | hacking with kali practical penetration testing techniques |
title_sub | practical penetration testing techniques |
topic | Kali Linux Penetration testing (Computer security) Computer networks / Security measures Kali Linux (DE-588)1058901281 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Kali Linux Penetration testing (Computer security) Computer networks / Security measures Penetrationstest |
url | http://proquest.tech.safaribooksonline.de/9780124077492 |
work_keys_str_mv | AT broadjames hackingwithkalipracticalpenetrationtestingtechniques AT bindnerandrew hackingwithkalipracticalpenetrationtestingtechniques |