Beginning ethical hacking with Kali Linux: computational techniques for resolving security issues
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
[2018]
|
Schlagworte: | |
Beschreibung: | xx, 417 Seiten Illustrationen |
ISBN: | 9781484238905 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046337835 | ||
003 | DE-604 | ||
005 | 20200204 | ||
007 | t | ||
008 | 200116s2018 a||| |||| 00||| eng d | ||
020 | |a 9781484238905 |c pbk. |9 978-1-4842-3890-5 | ||
035 | |a (OCoLC)1140165073 | ||
035 | |a (DE-599)BVBBV046337835 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
100 | 1 | |a Sinha, Sanjib |e Verfasser |4 aut | |
245 | 1 | 0 | |a Beginning ethical hacking with Kali Linux |b computational techniques for resolving security issues |c Sanjib Sinha |
264 | 1 | |a Berkeley, CA |b Apress |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xx, 417 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Security | |
650 | 4 | |a Open Source | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Open source software | |
650 | 4 | |a Computer programming | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4842-3891-2 |
999 | |a oai:aleph.bib-bvb.de:BVB01-031714545 |
Datensatz im Suchindex
_version_ | 1804180833556234240 |
---|---|
any_adam_object | |
author | Sinha, Sanjib |
author_facet | Sinha, Sanjib |
author_role | aut |
author_sort | Sinha, Sanjib |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV046337835 |
classification_rvk | ST 261 |
ctrlnum | (OCoLC)1140165073 (DE-599)BVBBV046337835 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01328nam a2200421 c 4500</leader><controlfield tag="001">BV046337835</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200204 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200116s2018 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484238905</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-4842-3890-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1140165073</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046337835</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sinha, Sanjib</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Beginning ethical hacking with Kali Linux</subfield><subfield code="b">computational techniques for resolving security issues</subfield><subfield code="c">Sanjib Sinha</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 417 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open Source</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-3891-2</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031714545</subfield></datafield></record></collection> |
id | DE-604.BV046337835 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:42:03Z |
institution | BVB |
isbn | 9781484238905 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031714545 |
oclc_num | 1140165073 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xx, 417 Seiten Illustrationen |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Sinha, Sanjib Verfasser aut Beginning ethical hacking with Kali Linux computational techniques for resolving security issues Sanjib Sinha Berkeley, CA Apress [2018] © 2018 xx, 417 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Security Open Source Systems and Data Security Data protection Open source software Computer programming Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-1-4842-3891-2 |
spellingShingle | Sinha, Sanjib Beginning ethical hacking with Kali Linux computational techniques for resolving security issues Security Open Source Systems and Data Security Data protection Open source software Computer programming Computer security Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Beginning ethical hacking with Kali Linux computational techniques for resolving security issues |
title_auth | Beginning ethical hacking with Kali Linux computational techniques for resolving security issues |
title_exact_search | Beginning ethical hacking with Kali Linux computational techniques for resolving security issues |
title_full | Beginning ethical hacking with Kali Linux computational techniques for resolving security issues Sanjib Sinha |
title_fullStr | Beginning ethical hacking with Kali Linux computational techniques for resolving security issues Sanjib Sinha |
title_full_unstemmed | Beginning ethical hacking with Kali Linux computational techniques for resolving security issues Sanjib Sinha |
title_short | Beginning ethical hacking with Kali Linux |
title_sort | beginning ethical hacking with kali linux computational techniques for resolving security issues |
title_sub | computational techniques for resolving security issues |
topic | Security Open Source Systems and Data Security Data protection Open source software Computer programming Computer security Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Security Open Source Systems and Data Security Data protection Open source software Computer programming Computer security Computersicherheit |
work_keys_str_mv | AT sinhasanjib beginningethicalhackingwithkalilinuxcomputationaltechniquesforresolvingsecurityissues |