Practical network scanning: capture network vulnerabilities using standard tools such as Nmap and Nessus
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2018
|
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Beschreibung: | Description based on online resource; title from title page (Safari, viewed June 15, 2018) |
Beschreibung: | 1 online resource (1 volume) illustrations |
ISBN: | 9781788832496 1788832493 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045144477 | ||
003 | DE-604 | ||
005 | 20200408 | ||
007 | cr|uuu---uuuuu | ||
008 | 180823s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781788832496 |9 978-1-78883-249-6 | ||
020 | |a 1788832493 |9 1-78883-249-3 | ||
035 | |a (ZDB-32-STB)on1040599376 | ||
035 | |a (OCoLC)1040599376 | ||
035 | |a (DE-599)BVBBV045144477 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Chauhan, Ajay Singh |e Verfasser |4 aut | |
245 | 1 | 0 | |a Practical network scanning |b capture network vulnerabilities using standard tools such as Nmap and Nessus |c Ajay Singh Chauhan |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2018 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title page (Safari, viewed June 15, 2018) | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781788839235 |
856 | 4 | 0 | |u http://proquest.tech.safaribooksonline.de/9781788839235 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-32-STB |a ZDB-4-NLEBK |a ZDB-5-WPSE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030534258 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1817504 |l UBY01 |p ZDB-4-NLEBK |q UBY01_DDA20 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178811428798464 |
---|---|
any_adam_object | |
author | Chauhan, Ajay Singh |
author_facet | Chauhan, Ajay Singh |
author_role | aut |
author_sort | Chauhan, Ajay Singh |
author_variant | a s c as asc |
building | Verbundindex |
bvnumber | BV045144477 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-32-STB ZDB-4-NLEBK ZDB-5-WPSE |
ctrlnum | (ZDB-32-STB)on1040599376 (OCoLC)1040599376 (DE-599)BVBBV045144477 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01968nmm a2200469zc 4500</leader><controlfield tag="001">BV045144477</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200408 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180823s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788832496</subfield><subfield code="9">978-1-78883-249-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788832493</subfield><subfield code="9">1-78883-249-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-32-STB)on1040599376</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1040599376</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045144477</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chauhan, Ajay Singh</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical network scanning</subfield><subfield code="b">capture network vulnerabilities using standard tools such as Nmap and Nessus</subfield><subfield code="c">Ajay Singh Chauhan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (Safari, viewed June 15, 2018)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781788839235</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://proquest.tech.safaribooksonline.de/9781788839235</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield><subfield code="a">ZDB-4-NLEBK</subfield><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030534258</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1817504</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA20</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045144477 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:09:54Z |
institution | BVB |
isbn | 9781788832496 1788832493 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030534258 |
oclc_num | 1040599376 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-32-STB ZDB-4-NLEBK ZDB-5-WPSE ZDB-4-NLEBK UBY01_DDA20 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing |
record_format | marc |
spelling | Chauhan, Ajay Singh Verfasser aut Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan Birmingham, UK Packt Publishing 2018 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title page (Safari, viewed June 15, 2018) Computer networks Security measures Computers Access control Computer security Penetration testing (Computer security) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Penetrationstest (DE-588)4825817-9 s DE-604 Erscheint auch als Druck-Ausgabe 9781788839235 http://proquest.tech.safaribooksonline.de/9781788839235 Aggregator URL des Erstveröffentlichers Volltext |
spellingShingle | Chauhan, Ajay Singh Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Computer networks Security measures Computers Access control Computer security Penetration testing (Computer security) Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4825817-9 |
title | Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus |
title_auth | Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus |
title_exact_search | Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus |
title_full | Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan |
title_fullStr | Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan |
title_full_unstemmed | Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan |
title_short | Practical network scanning |
title_sort | practical network scanning capture network vulnerabilities using standard tools such as nmap and nessus |
title_sub | capture network vulnerabilities using standard tools such as Nmap and Nessus |
topic | Computer networks Security measures Computers Access control Computer security Penetration testing (Computer security) Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Computer networks Security measures Computers Access control Computer security Penetration testing (Computer security) Computersicherheit Penetrationstest |
url | http://proquest.tech.safaribooksonline.de/9781788839235 |
work_keys_str_mv | AT chauhanajaysingh practicalnetworkscanningcapturenetworkvulnerabilitiesusingstandardtoolssuchasnmapandnessus |