Ethical hacking: malware fundamentals
Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2016
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005246 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477362 | ||
003 | DE-604 | ||
005 | 20220216 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781509005246 |9 978-1-5090-0524-6 | ||
035 | |a (ZDB-37-ICG)EDP460 | ||
035 | |a (OCoLC)1269396972 | ||
035 | |a (DE-599)BVBBV047477362 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ethical hacking |b malware fundamentals |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2016 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Ethics | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Security | |
650 | 4 | |a Authentication | |
650 | 4 | |a Access control | |
650 | 4 | |a Privacy | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878923 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP460 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP460 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793429712896 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477362 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP460 (OCoLC)1269396972 (DE-599)BVBBV047477362 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01761nmm a2200433zc 4500</leader><controlfield tag="001">BV047477362</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220216 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005246</subfield><subfield code="9">978-1-5090-0524-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269396972</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477362</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">malware fundamentals</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878923</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP460</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP460</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477362 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005246 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878923 |
oclc_num | 1269396972 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Ethical hacking malware fundamentals Sean Oriyano United States IEEE 2016 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware Computer security Ethics Computer viruses Security Authentication Access control Privacy (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Ethical hacking malware fundamentals Computer security Ethics Computer viruses Security Authentication Access control Privacy |
subject_GND | (DE-588)4017102-4 |
title | Ethical hacking malware fundamentals |
title_auth | Ethical hacking malware fundamentals |
title_exact_search | Ethical hacking malware fundamentals |
title_exact_search_txtP | Ethical hacking malware fundamentals |
title_full | Ethical hacking malware fundamentals Sean Oriyano |
title_fullStr | Ethical hacking malware fundamentals Sean Oriyano |
title_full_unstemmed | Ethical hacking malware fundamentals Sean Oriyano |
title_short | Ethical hacking |
title_sort | ethical hacking malware fundamentals |
title_sub | malware fundamentals |
topic | Computer security Ethics Computer viruses Security Authentication Access control Privacy |
topic_facet | Computer security Ethics Computer viruses Security Authentication Access control Privacy Film |
work_keys_str_mv | AT oriyanosean ethicalhackingmalwarefundamentals |