Hacking & Security: das umfassende Handbuch
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Buch |
Sprache: | German |
Veröffentlicht: |
Bonn
Rheinwerk Verlag
2018
|
Ausgabe: | 1. Auflage, 1. korrigierter Nachdruck |
Schriftenreihe: | Rheinwerk Computing
|
Schlagworte: | |
Beschreibung: | Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits" |
Beschreibung: | 1067 Seiten Illustrationen, Diagramme |
ISBN: | 9783836245487 3836245485 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045058035 | ||
003 | DE-604 | ||
005 | 20200303 | ||
007 | t| | ||
008 | 180626s2018 xx a||| |||| 00||| ger d | ||
020 | |a 9783836245487 |c Festeinband : EUR 49.90 (DE), EUR 51.30 (AT), CHF 63.90 (freier Preis) |9 978-3-8362-4548-7 | ||
020 | |a 3836245485 |9 3-8362-4548-5 | ||
024 | 3 | |a 9783836245487 | |
028 | 5 | 2 | |a Bestellnummer: 459/04548 |
035 | |a (OCoLC)1035472946 | ||
035 | |a (DE-599)BVBBV045058035 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
049 | |a DE-188 |a DE-634 |a DE-898 |a DE-703 | ||
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 658.478 |2 22/ger | |
082 | 0 | |a 004 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a 650 |2 sdnb | ||
100 | 1 | |a Aigner, Roland |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking & Security |b das umfassende Handbuch |c Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
246 | 1 | 3 | |a Hacking und Security |
246 | 1 | 3 | |a Hacking and Security |
250 | |a 1. Auflage, 1. korrigierter Nachdruck | ||
264 | 1 | |a Bonn |b Rheinwerk Verlag |c 2018 | |
300 | |a 1067 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Rheinwerk Computing | |
500 | |a Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits" | ||
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Smartphone |0 (DE-588)4845922-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
653 | |a Hacking | ||
653 | |a Hacker | ||
653 | |a Angriff | ||
653 | |a Cracker | ||
653 | |a NSA | ||
653 | |a Tools | ||
653 | |a Windows | ||
653 | |a Penetration Test | ||
653 | |a Mobile | ||
653 | |a Smartphone | ||
653 | |a Bluetooth | ||
653 | |a WLan | ||
653 | |a Cloud | ||
653 | |a Active Directory | ||
653 | |a Port Scan | ||
653 | |a Key-Logger | ||
653 | |a Monitoring | ||
653 | |a Rootkits | ||
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Smartphone |0 (DE-588)4845922-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 4 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 4 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 4 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 4 | 4 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 4 | 5 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 5 | |8 1\p |5 DE-604 | |
700 | 1 | |a Gebeshuber, Klaus |e Verfasser |0 (DE-588)1161609970 |4 aut | |
700 | 1 | |a Hackner, Thomas |e Verfasser |4 aut | |
700 | 1 | |a Kania, Stefan |d 1961- |e Verfasser |0 (DE-588)1051888980 |4 aut | |
700 | 1 | |a Kloep, Peter |e Verfasser |0 (DE-588)1190658445 |4 aut | |
700 | 1 | |a Kofler, Michael |d 1967- |e Verfasser |0 (DE-588)121636763 |4 aut | |
700 | 1 | |a Neugebauer, Frank |e Verfasser |0 (DE-588)143900641 |4 aut | |
700 | 1 | |a Widl, Markus |e Verfasser |0 (DE-588)143202251 |4 aut | |
700 | 1 | |a Zingsheim, André |e Verfasser |4 aut | |
710 | 2 | |a Rheinwerk Verlag |0 (DE-588)1081738405 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe (PDF, ePub, Mobi, Online) |z 978-3-8362-4549-4 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe; Bundle Buch + E-Book; E-Book Formate (PDF, ePub, Mobi, Online) |z 978-3-8362-5546-2 |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030449633 |
Datensatz im Suchindex
_version_ | 1818330266721058816 |
---|---|
adam_text | |
any_adam_object | |
author | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André |
author_GND | (DE-588)1161609970 (DE-588)1051888980 (DE-588)1190658445 (DE-588)121636763 (DE-588)143900641 (DE-588)143202251 |
author_facet | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | Aigner, Roland |
author_variant | r a ra k g kg t h th s k sk p k pk m k mk f n fn m w mw a z az |
building | Verbundindex |
bvnumber | BV045058035 |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)1035472946 (DE-599)BVBBV045058035 |
dewey-full | 005.8 658.478 004 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 658 - General management 004 - Computer science |
dewey-raw | 005.8 658.478 004 |
dewey-search | 005.8 658.478 004 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
edition | 1. Auflage, 1. korrigierter Nachdruck |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV045058035</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200303</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180626s2018 xx a||| |||| 00||| ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836245487</subfield><subfield code="c">Festeinband : EUR 49.90 (DE), EUR 51.30 (AT), CHF 63.90 (freier Preis)</subfield><subfield code="9">978-3-8362-4548-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3836245485</subfield><subfield code="9">3-8362-4548-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783836245487</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 459/04548</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1035472946</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045058035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aigner, Roland</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking & Security</subfield><subfield code="b">das umfassende Handbuch</subfield><subfield code="c">Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking und Security</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking and Security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Auflage, 1. korrigierter Nachdruck</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk Verlag</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1067 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk Computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits"</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Angriff</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cracker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NSA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Tools</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration Test</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smartphone</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bluetooth</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">WLan</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Active Directory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Port Scan</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key-Logger</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Monitoring</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Rootkits</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="4"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="5"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hackner, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kania, Stefan</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1051888980</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kloep, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1190658445</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kofler, Michael</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121636763</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neugebauer, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143900641</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widl, Markus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143202251</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zingsheim, André</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rheinwerk Verlag</subfield><subfield code="0">(DE-588)1081738405</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe (PDF, ePub, Mobi, Online)</subfield><subfield code="z">978-3-8362-4549-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe; Bundle Buch + E-Book; E-Book Formate (PDF, ePub, Mobi, Online)</subfield><subfield code="z">978-3-8362-5546-2</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030449633</subfield></datafield></record></collection> |
id | DE-604.BV045058035 |
illustrated | Illustrated |
indexdate | 2024-12-13T13:01:13Z |
institution | BVB |
institution_GND | (DE-588)1081738405 |
isbn | 9783836245487 3836245485 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030449633 |
oclc_num | 1035472946 |
open_access_boolean | |
owner | DE-188 DE-634 DE-898 DE-BY-UBR DE-703 |
owner_facet | DE-188 DE-634 DE-898 DE-BY-UBR DE-703 |
physical | 1067 Seiten Illustrationen, Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Rheinwerk Verlag |
record_format | marc |
series2 | Rheinwerk Computing |
spelling | Aigner, Roland Verfasser aut Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim Hacking und Security Hacking and Security 1. Auflage, 1. korrigierter Nachdruck Bonn Rheinwerk Verlag 2018 1067 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Rheinwerk Computing Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits" Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Metasploit-Framework (DE-588)7742304-5 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Softwarewerkzeug (DE-588)4116526-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Angriff (DE-588)4142472-4 gnd rswk-swf Kali Linux (DE-588)1058901281 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Smartphone (DE-588)4845922-7 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Hacking Hacker Angriff Cracker NSA Tools Windows Penetration Test Mobile Smartphone Bluetooth WLan Cloud Active Directory Port Scan Key-Logger Monitoring Rootkits Hacker (DE-588)4113821-1 s Angriff (DE-588)4142472-4 s DE-604 Metasploit-Framework (DE-588)7742304-5 s Smartphone (DE-588)4845922-7 s Internet der Dinge (DE-588)7713781-4 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Softwareschwachstelle (DE-588)4752508-3 s Penetrationstest (DE-588)4825817-9 s Softwarewerkzeug (DE-588)4116526-3 s Kali Linux (DE-588)1058901281 s 1\p DE-604 Gebeshuber, Klaus Verfasser (DE-588)1161609970 aut Hackner, Thomas Verfasser aut Kania, Stefan 1961- Verfasser (DE-588)1051888980 aut Kloep, Peter Verfasser (DE-588)1190658445 aut Kofler, Michael 1967- Verfasser (DE-588)121636763 aut Neugebauer, Frank Verfasser (DE-588)143900641 aut Widl, Markus Verfasser (DE-588)143202251 aut Zingsheim, André Verfasser aut Rheinwerk Verlag (DE-588)1081738405 pbl Erscheint auch als Online-Ausgabe (PDF, ePub, Mobi, Online) 978-3-8362-4549-4 Erscheint auch als Online-Ausgabe; Bundle Buch + E-Book; E-Book Formate (PDF, ePub, Mobi, Online) 978-3-8362-5546-2 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André Hacking & Security das umfassende Handbuch Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Angriff (DE-588)4142472-4 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)7742304-5 (DE-588)4752508-3 (DE-588)4116526-3 (DE-588)4274324-2 (DE-588)4142472-4 (DE-588)1058901281 (DE-588)4011144-1 (DE-588)4845922-7 (DE-588)4825817-9 (DE-588)4113821-1 |
title | Hacking & Security das umfassende Handbuch |
title_alt | Hacking und Security Hacking and Security |
title_auth | Hacking & Security das umfassende Handbuch |
title_exact_search | Hacking & Security das umfassende Handbuch |
title_full | Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_fullStr | Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_full_unstemmed | Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_short | Hacking & Security |
title_sort | hacking security das umfassende handbuch |
title_sub | das umfassende Handbuch |
topic | Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Angriff (DE-588)4142472-4 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | Internet der Dinge Metasploit-Framework Softwareschwachstelle Softwarewerkzeug Computersicherheit Angriff Kali Linux Datensicherung Smartphone Penetrationstest Hacker |
work_keys_str_mv | AT aignerroland hackingsecuritydasumfassendehandbuch AT gebeshuberklaus hackingsecuritydasumfassendehandbuch AT hacknerthomas hackingsecuritydasumfassendehandbuch AT kaniastefan hackingsecuritydasumfassendehandbuch AT kloeppeter hackingsecuritydasumfassendehandbuch AT koflermichael hackingsecuritydasumfassendehandbuch AT neugebauerfrank hackingsecuritydasumfassendehandbuch AT widlmarkus hackingsecuritydasumfassendehandbuch AT zingsheimandre hackingsecuritydasumfassendehandbuch AT rheinwerkverlag hackingsecuritydasumfassendehandbuch AT aignerroland hackingundsecurity AT gebeshuberklaus hackingundsecurity AT hacknerthomas hackingundsecurity AT kaniastefan hackingundsecurity AT kloeppeter hackingundsecurity AT koflermichael hackingundsecurity AT neugebauerfrank hackingundsecurity AT widlmarkus hackingundsecurity AT zingsheimandre hackingundsecurity AT rheinwerkverlag hackingundsecurity AT aignerroland hackingandsecurity AT gebeshuberklaus hackingandsecurity AT hacknerthomas hackingandsecurity AT kaniastefan hackingandsecurity AT kloeppeter hackingandsecurity AT koflermichael hackingandsecurity AT neugebauerfrank hackingandsecurity AT widlmarkus hackingandsecurity AT zingsheimandre hackingandsecurity AT rheinwerkverlag hackingandsecurity |