An introduction to hacking and crimeware: a pocket guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire
IT Governance Pub.
2012
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (53 pages) |
ISBN: | 9781849283298 184928329X 9781849283304 1849283303 1299468659 9781299468658 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349644 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849283298 |9 978-1-84928-329-8 | ||
020 | |a 184928329X |9 1-84928-329-X | ||
020 | |a 9781849283304 |9 978-1-84928-330-4 | ||
020 | |a 1849283303 |9 1-84928-330-3 | ||
020 | |a 1299468659 |9 1-299-46865-9 | ||
020 | |a 9781299468658 |9 978-1-299-46865-8 | ||
035 | |a (ZDB-4-ITC)ocn794491658 | ||
035 | |a (OCoLC)794491658 | ||
035 | |a (DE-599)BVBBV045349644 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Loewengart, Victoria |e Verfasser |4 aut | |
245 | 1 | 0 | |a An introduction to hacking and crimeware |b a pocket guide |c Victoria Loewengart |
264 | 1 | |a Ely, Cambridgeshire |b IT Governance Pub. |c 2012 | |
300 | |a 1 online resource (53 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc |a Internet |x Security measures |v Handbooks, manuals, etc |a Computer crimes |x Prevention |v Handbooks, manuals, etc | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Loewengart, Victoria |t Introduction to hacking and crimeware |d IT Governance, 2012 |z 9781849283281 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736298 |
Datensatz im Suchindex
_version_ | 1804179173827149824 |
---|---|
any_adam_object | |
author | Loewengart, Victoria |
author_facet | Loewengart, Victoria |
author_role | aut |
author_sort | Loewengart, Victoria |
author_variant | v l vl |
building | Verbundindex |
bvnumber | BV045349644 |
classification_rvk | ST 276 |
collection | ZDB-4-ITC |
contents | An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities |
ctrlnum | (ZDB-4-ITC)ocn794491658 (OCoLC)794491658 (DE-599)BVBBV045349644 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02095nmm a2200469zc 4500</leader><controlfield tag="001">BV045349644</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283298</subfield><subfield code="9">978-1-84928-329-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">184928329X</subfield><subfield code="9">1-84928-329-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283304</subfield><subfield code="9">978-1-84928-330-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283303</subfield><subfield code="9">1-84928-330-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299468659</subfield><subfield code="9">1-299-46865-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299468658</subfield><subfield code="9">978-1-299-46865-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn794491658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794491658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349644</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Loewengart, Victoria</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">An introduction to hacking and crimeware</subfield><subfield code="b">a pocket guide</subfield><subfield code="c">Victoria Loewengart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (53 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Loewengart, Victoria</subfield><subfield code="t">Introduction to hacking and crimeware</subfield><subfield code="d">IT Governance, 2012</subfield><subfield code="z">9781849283281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736298</subfield></datafield></record></collection> |
id | DE-604.BV045349644 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781849283298 184928329X 9781849283304 1849283303 1299468659 9781299468658 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736298 |
oclc_num | 794491658 |
open_access_boolean | |
physical | 1 online resource (53 pages) |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Loewengart, Victoria Verfasser aut An introduction to hacking and crimeware a pocket guide Victoria Loewengart Ely, Cambridgeshire IT Governance Pub. 2012 1 online resource (53 pages) txt rdacontent c rdamedia cr rdacarrier Print version record An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Computer security fast Internet / Security measures fast Computer security Handbooks, manuals, etc Internet Security measures Handbooks, manuals, etc Computer crimes Prevention Handbooks, manuals, etc Erscheint auch als Druck-Ausgabe Loewengart, Victoria Introduction to hacking and crimeware IT Governance, 2012 9781849283281 |
spellingShingle | Loewengart, Victoria An introduction to hacking and crimeware a pocket guide An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Computer security fast Internet / Security measures fast Computer security Handbooks, manuals, etc Internet Security measures Handbooks, manuals, etc Computer crimes Prevention Handbooks, manuals, etc |
title | An introduction to hacking and crimeware a pocket guide |
title_auth | An introduction to hacking and crimeware a pocket guide |
title_exact_search | An introduction to hacking and crimeware a pocket guide |
title_full | An introduction to hacking and crimeware a pocket guide Victoria Loewengart |
title_fullStr | An introduction to hacking and crimeware a pocket guide Victoria Loewengart |
title_full_unstemmed | An introduction to hacking and crimeware a pocket guide Victoria Loewengart |
title_short | An introduction to hacking and crimeware |
title_sort | an introduction to hacking and crimeware a pocket guide |
title_sub | a pocket guide |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes / Prevention fast Computer security fast Internet / Security measures fast Computer security Handbooks, manuals, etc Internet Security measures Handbooks, manuals, etc Computer crimes Prevention Handbooks, manuals, etc |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes / Prevention Computer security Internet / Security measures Computer security Handbooks, manuals, etc Internet Security measures Handbooks, manuals, etc Computer crimes Prevention Handbooks, manuals, etc |
work_keys_str_mv | AT loewengartvictoria anintroductiontohackingandcrimewareapocketguide |