Instant Netcat starter: learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Pub.
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | Includes bibliographical references |
Beschreibung: | ii, 48 pages : |
ISBN: | 9781849519977 1849519978 184951996X 9781849519960 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043775499 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781849519977 |9 978-1-84951-997-7 | ||
020 | |a 1849519978 |9 1-84951-997-8 | ||
020 | |a 184951996X |9 1-84951-996-X | ||
020 | |a 9781849519960 |9 978-1-84951-996-0 | ||
035 | |a (ZDB-4-EBA)ocn834588146 | ||
035 | |a (ZDB-4-ITC)ocn834588146 | ||
035 | |a (OCoLC)834588146 | ||
035 | |a (DE-599)BVBBV043775499 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Yerrid, K. C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Instant Netcat starter |b learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day |c K.C. Yerrid |
264 | 1 | |a Birmingham |b Packt Pub. |c 2013 | |
300 | |a ii, 48 pages : | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a TCP/IP (Computer network protocol) |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a TCP/IP (Computer network protocol) | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029186559 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=771470 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=771470 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176601318948864 |
---|---|
any_adam_object | |
author | Yerrid, K. C. |
author_facet | Yerrid, K. C. |
author_role | aut |
author_sort | Yerrid, K. C. |
author_variant | k c y kc kcy |
building | Verbundindex |
bvnumber | BV043775499 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn834588146 (ZDB-4-ITC)ocn834588146 (OCoLC)834588146 (DE-599)BVBBV043775499 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01937nmm a2200481zc 4500</leader><controlfield tag="001">BV043775499</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849519977</subfield><subfield code="9">978-1-84951-997-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849519978</subfield><subfield code="9">1-84951-997-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">184951996X</subfield><subfield code="9">1-84951-996-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849519960</subfield><subfield code="9">978-1-84951-996-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn834588146</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn834588146</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)834588146</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043775499</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yerrid, K. C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Instant Netcat starter</subfield><subfield code="b">learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day</subfield><subfield code="c">K.C. Yerrid</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ii, 48 pages :</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TCP/IP (Computer network protocol)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029186559</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=771470</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=771470</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043775499 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:46Z |
institution | BVB |
isbn | 9781849519977 1849519978 184951996X 9781849519960 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029186559 |
oclc_num | 834588146 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | ii, 48 pages : |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Pub. |
record_format | marc |
spelling | Yerrid, K. C. Verfasser aut Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day K.C. Yerrid Birmingham Packt Pub. 2013 ii, 48 pages : txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast TCP/IP (Computer network protocol) fast Computer networks Security measures Data protection TCP/IP (Computer network protocol) |
spellingShingle | Yerrid, K. C. Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast TCP/IP (Computer network protocol) fast Computer networks Security measures Data protection TCP/IP (Computer network protocol) |
title | Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day |
title_auth | Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day |
title_exact_search | Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day |
title_full | Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day K.C. Yerrid |
title_fullStr | Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day K.C. Yerrid |
title_full_unstemmed | Instant Netcat starter learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day K.C. Yerrid |
title_short | Instant Netcat starter |
title_sort | instant netcat starter learn to harness the power and versatility of netcat and understand why it remains an integral part of it and security toolkits to this day |
title_sub | learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and security toolkits to this day |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Data protection fast TCP/IP (Computer network protocol) fast Computer networks Security measures Data protection TCP/IP (Computer network protocol) |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Data protection TCP/IP (Computer network protocol) Computer networks Security measures |
work_keys_str_mv | AT yerridkc instantnetcatstarterlearntoharnessthepowerandversatilityofnetcatandunderstandwhyitremainsanintegralpartofitandsecuritytoolkitstothisday |