The basics of web hacking: tools and techniques to attack the Web
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Syngress, an imprint of Elsevier
2013
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xiii, 145 p. |
ISBN: | 9780124166004 9780124166592 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044176475 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124166004 |9 978-0-12-416600-4 | ||
020 | |a 9780124166592 |c Online |9 978-0-12-416659-2 | ||
035 | |a (ZDB-30-PAD)EBC1222592 | ||
035 | |a (ZDB-89-EBL)EBL1222592 | ||
035 | |a (OCoLC)851158028 | ||
035 | |a (DE-599)BVBBV044176475 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Pauli, Joshua J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The basics of web hacking |b tools and techniques to attack the Web |c Josh Pauli ; Scott White, technical editor |
264 | 1 | |a Amsterdam |b Syngress, an imprint of Elsevier |c 2013 | |
300 | |a xiii, 145 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Web sites |x Security measures | |
650 | 4 | |a Web applications |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Website |0 (DE-588)4596172-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Website |0 (DE-588)4596172-4 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a White, Scott |e Sonstige |4 oth | |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029583320 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177298316853248 |
---|---|
any_adam_object | |
author | Pauli, Joshua J. |
author_facet | Pauli, Joshua J. |
author_role | aut |
author_sort | Pauli, Joshua J. |
author_variant | j j p jj jjp |
building | Verbundindex |
bvnumber | BV044176475 |
collection | ZDB-30-PAD |
ctrlnum | (ZDB-30-PAD)EBC1222592 (ZDB-89-EBL)EBL1222592 (OCoLC)851158028 (DE-599)BVBBV044176475 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02382nmm a2200613zc 4500</leader><controlfield tag="001">BV044176475</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166004</subfield><subfield code="9">978-0-12-416600-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166592</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-416659-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC1222592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1222592</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)851158028</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044176475</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pauli, Joshua J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The basics of web hacking</subfield><subfield code="b">tools and techniques to attack the Web</subfield><subfield code="c">Josh Pauli ; Scott White, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress, an imprint of Elsevier</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 145 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web applications</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Website</subfield><subfield code="0">(DE-588)4596172-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Website</subfield><subfield code="0">(DE-588)4596172-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">White, Scott</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029583320</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044176475 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:45:51Z |
institution | BVB |
isbn | 9780124166004 9780124166592 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029583320 |
oclc_num | 851158028 |
open_access_boolean | |
physical | xiii, 145 p. |
psigel | ZDB-30-PAD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress, an imprint of Elsevier |
record_format | marc |
spelling | Pauli, Joshua J. Verfasser aut The basics of web hacking tools and techniques to attack the Web Josh Pauli ; Scott White, technical editor Amsterdam Syngress, an imprint of Elsevier 2013 xiii, 145 p. txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Computer hackers Computer crimes Prevention Rechnernetz (DE-588)4070085-9 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Website (DE-588)4596172-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf World Wide Web (DE-588)4363898-3 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Website (DE-588)4596172-4 s 2\p DE-604 Rechnernetz (DE-588)4070085-9 s 3\p DE-604 White, Scott Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Pauli, Joshua J. The basics of web hacking tools and techniques to attack the Web Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Computer hackers Computer crimes Prevention Rechnernetz (DE-588)4070085-9 gnd World Wide Web (DE-588)4363898-3 gnd Datensicherung (DE-588)4011144-1 gnd Website (DE-588)4596172-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4363898-3 (DE-588)4011144-1 (DE-588)4596172-4 (DE-588)4274324-2 |
title | The basics of web hacking tools and techniques to attack the Web |
title_auth | The basics of web hacking tools and techniques to attack the Web |
title_exact_search | The basics of web hacking tools and techniques to attack the Web |
title_full | The basics of web hacking tools and techniques to attack the Web Josh Pauli ; Scott White, technical editor |
title_fullStr | The basics of web hacking tools and techniques to attack the Web Josh Pauli ; Scott White, technical editor |
title_full_unstemmed | The basics of web hacking tools and techniques to attack the Web Josh Pauli ; Scott White, technical editor |
title_short | The basics of web hacking |
title_sort | the basics of web hacking tools and techniques to attack the web |
title_sub | tools and techniques to attack the Web |
topic | Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Computer hackers Computer crimes Prevention Rechnernetz (DE-588)4070085-9 gnd World Wide Web (DE-588)4363898-3 gnd Datensicherung (DE-588)4011144-1 gnd Website (DE-588)4596172-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Web sites Security measures Web applications Security measures Computer networks Security measures Penetration testing (Computer security) Computer hackers Computer crimes Prevention Rechnernetz World Wide Web Datensicherung Website Computersicherheit |
work_keys_str_mv | AT paulijoshuaj thebasicsofwebhackingtoolsandtechniquestoattacktheweb AT whitescott thebasicsofwebhackingtoolsandtechniquestoattacktheweb |