Constructing an ethical hacking knowledge base for threat awareness and prevention:
"This book provides both theoretical and practical insights into ethical hacking techniques. It presents many possible attacks with short source code samples which may help individual to get an idea about exploitation mechanisms used by black hat hackers"...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 Volltext |
Zusammenfassung: | "This book provides both theoretical and practical insights into ethical hacking techniques. It presents many possible attacks with short source code samples which may help individual to get an idea about exploitation mechanisms used by black hat hackers"... |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522576297 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045335557 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 181204s2019 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522576297 |9 978-1-5225-7629-7 | ||
035 | |a (OCoLC)1078670173 | ||
035 | |a (DE-599)BVBBV045335557 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Dhavale, Sunita Vikrant |0 (DE-588)1144301696 |4 aut | |
245 | 1 | 0 | |a Constructing an ethical hacking knowledge base for threat awareness and prevention |c Sunita Vikrant Dhavale |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "This book provides both theoretical and practical insights into ethical hacking techniques. It presents many possible attacks with short source code samples which may help individual to get an idea about exploitation mechanisms used by black hat hackers"... | ||
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Hacking |x Prevention | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, h/c |z 978-1-5225-7628-0 |
856 | 4 | 0 | |u https://www.igi-global.com/gateway/book/208849 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://www.igi-global.com/gateway/book/208849 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/208849 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/208849 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/208849 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076706840543232 |
---|---|
adam_text | |
any_adam_object | |
author | Dhavale, Sunita Vikrant |
author_GND | (DE-588)1144301696 |
author_facet | Dhavale, Sunita Vikrant |
author_role | aut |
author_sort | Dhavale, Sunita Vikrant |
author_variant | s v d sv svd |
building | Verbundindex |
bvnumber | BV045335557 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
ctrlnum | (OCoLC)1078670173 (DE-599)BVBBV045335557 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV045335557</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181204s2019 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522576297</subfield><subfield code="9">978-1-5225-7629-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1078670173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045335557</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dhavale, Sunita Vikrant</subfield><subfield code="0">(DE-588)1144301696</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Constructing an ethical hacking knowledge base for threat awareness and prevention</subfield><subfield code="c">Sunita Vikrant Dhavale</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides both theoretical and practical insights into ethical hacking techniques. It presents many possible attacks with short source code samples which may help individual to get an idea about exploitation mechanisms used by black hat hackers"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, h/c</subfield><subfield code="z">978-1-5225-7628-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.igi-global.com/gateway/book/208849</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/208849</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/208849</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/208849</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/208849</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045335557 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:01:34Z |
institution | BVB |
isbn | 9781522576297 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030722341 |
oclc_num | 1078670173 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spelling | Dhavale, Sunita Vikrant (DE-588)1144301696 aut Constructing an ethical hacking knowledge base for threat awareness and prevention Sunita Vikrant Dhavale Hershey, PA IGI Global [2019] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "This book provides both theoretical and practical insights into ethical hacking techniques. It presents many possible attacks with short source code samples which may help individual to get an idea about exploitation mechanisms used by black hat hackers"... Penetration testing (Computer security) Hacking Prevention Erscheint auch als Druck-Ausgabe, h/c 978-1-5225-7628-0 https://www.igi-global.com/gateway/book/208849 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Dhavale, Sunita Vikrant Constructing an ethical hacking knowledge base for threat awareness and prevention Penetration testing (Computer security) Hacking Prevention |
title | Constructing an ethical hacking knowledge base for threat awareness and prevention |
title_auth | Constructing an ethical hacking knowledge base for threat awareness and prevention |
title_exact_search | Constructing an ethical hacking knowledge base for threat awareness and prevention |
title_full | Constructing an ethical hacking knowledge base for threat awareness and prevention Sunita Vikrant Dhavale |
title_fullStr | Constructing an ethical hacking knowledge base for threat awareness and prevention Sunita Vikrant Dhavale |
title_full_unstemmed | Constructing an ethical hacking knowledge base for threat awareness and prevention Sunita Vikrant Dhavale |
title_short | Constructing an ethical hacking knowledge base for threat awareness and prevention |
title_sort | constructing an ethical hacking knowledge base for threat awareness and prevention |
topic | Penetration testing (Computer security) Hacking Prevention |
topic_facet | Penetration testing (Computer security) Hacking Prevention |
url | https://www.igi-global.com/gateway/book/208849 |
work_keys_str_mv | AT dhavalesunitavikrant constructinganethicalhackingknowledgebaseforthreatawarenessandprevention |