Securing network infrastructure: discover practical network security with Nmap and Nessus 7
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
March 2019
|
Schriftenreihe: | Book collection
|
Zusammenfassung: | Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization |
Beschreibung: | Auf dem Cover: Learning path securing network infrastructure |
Beschreibung: | x, 521 Seiten Illustrationen |
ISBN: | 9781838642303 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046751267 | ||
003 | DE-604 | ||
005 | 20200915 | ||
007 | t | ||
008 | 200605s2019 a||| |||| 00||| eng d | ||
020 | |a 9781838642303 |9 978-1-83864-230-3 | ||
035 | |a (OCoLC)1197715380 | ||
035 | |a (DE-599)BVBBV046751267 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Jetty, Sairam |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing network infrastructure |b discover practical network security with Nmap and Nessus 7 |c Sairam Jetty ; Sagar Rahalkar |
246 | 1 | 3 | |a Learning path securing network infrastructure |
264 | 1 | |a Birmingham ; Mumbai |b Packt |c March 2019 | |
264 | 4 | |c © 2019 | |
300 | |a x, 521 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Book collection | |
500 | |a Auf dem Cover: Learning path securing network infrastructure | ||
520 | 3 | |a Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization | |
700 | 1 | |a Rahalkar, Sagar |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-83864-697-4 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032160987 |
Datensatz im Suchindex
_version_ | 1804181510827278336 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Jetty, Sairam |
author_facet | Jetty, Sairam |
author_role | aut |
author_sort | Jetty, Sairam |
author_variant | s j sj |
building | Verbundindex |
bvnumber | BV046751267 |
classification_rvk | ST 200 ST 277 |
ctrlnum | (OCoLC)1197715380 (DE-599)BVBBV046751267 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01478nam a2200361 c 4500</leader><controlfield tag="001">BV046751267</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200915 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200605s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838642303</subfield><subfield code="9">978-1-83864-230-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1197715380</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046751267</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jetty, Sairam</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing network infrastructure</subfield><subfield code="b">discover practical network security with Nmap and Nessus 7</subfield><subfield code="c">Sairam Jetty ; Sagar Rahalkar</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Learning path securing network infrastructure</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">March 2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 521 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Book collection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: Learning path securing network infrastructure</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-83864-697-4</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032160987</subfield></datafield></record></collection> |
id | DE-604.BV046751267 |
illustrated | Illustrated |
index_date | 2024-07-03T14:42:05Z |
indexdate | 2024-07-10T08:52:48Z |
institution | BVB |
isbn | 9781838642303 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032160987 |
oclc_num | 1197715380 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | x, 521 Seiten Illustrationen |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt |
record_format | marc |
series2 | Book collection |
spelling | Jetty, Sairam Verfasser aut Securing network infrastructure discover practical network security with Nmap and Nessus 7 Sairam Jetty ; Sagar Rahalkar Learning path securing network infrastructure Birmingham ; Mumbai Packt March 2019 © 2019 x, 521 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Book collection Auf dem Cover: Learning path securing network infrastructure Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization Rahalkar, Sagar Sonstige oth Erscheint auch als Online-Ausgabe 978-1-83864-697-4 |
spellingShingle | Jetty, Sairam Securing network infrastructure discover practical network security with Nmap and Nessus 7 |
title | Securing network infrastructure discover practical network security with Nmap and Nessus 7 |
title_alt | Learning path securing network infrastructure |
title_auth | Securing network infrastructure discover practical network security with Nmap and Nessus 7 |
title_exact_search | Securing network infrastructure discover practical network security with Nmap and Nessus 7 |
title_exact_search_txtP | Securing network infrastructure discover practical network security with Nmap and Nessus 7 |
title_full | Securing network infrastructure discover practical network security with Nmap and Nessus 7 Sairam Jetty ; Sagar Rahalkar |
title_fullStr | Securing network infrastructure discover practical network security with Nmap and Nessus 7 Sairam Jetty ; Sagar Rahalkar |
title_full_unstemmed | Securing network infrastructure discover practical network security with Nmap and Nessus 7 Sairam Jetty ; Sagar Rahalkar |
title_short | Securing network infrastructure |
title_sort | securing network infrastructure discover practical network security with nmap and nessus 7 |
title_sub | discover practical network security with Nmap and Nessus 7 |
work_keys_str_mv | AT jettysairam securingnetworkinfrastructurediscoverpracticalnetworksecuritywithnmapandnessus7 AT rahalkarsagar securingnetworkinfrastructurediscoverpracticalnetworksecuritywithnmapandnessus7 AT jettysairam learningpathsecuringnetworkinfrastructure AT rahalkarsagar learningpathsecuringnetworkinfrastructure |