Introduction to penetration testing:
Penetration testing (or 'pen testing') is the process of testing a computer system, Web application or network to find vulnerabilities that could be exploited by an attacker. This course will discuss the concept of pen testing and what role it plays. Next, the course will review ethical ha...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2016
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | Penetration testing (or 'pen testing') is the process of testing a computer system, Web application or network to find vulnerabilities that could be exploited by an attacker. This course will discuss the concept of pen testing and what role it plays. Next, the course will review ethical hacking, as well as the legal and operational benefits of performing pen testing. Finally, the course will conclude with an overview of the Penetration Testing Execution Standard |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005277 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477365 | ||
003 | DE-604 | ||
005 | 20220217 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781509005277 |9 978-1-5090-0527-7 | ||
035 | |a (ZDB-37-ICG)EDP463 | ||
035 | |a (OCoLC)1269392892 | ||
035 | |a (DE-599)BVBBV047477365 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Introduction to penetration testing |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2016 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a Penetration testing (or 'pen testing') is the process of testing a computer system, Web application or network to find vulnerabilities that could be exploited by an attacker. This course will discuss the concept of pen testing and what role it plays. Next, the course will review ethical hacking, as well as the legal and operational benefits of performing pen testing. Finally, the course will conclude with an overview of the Penetration Testing Execution Standard | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Internet | |
650 | 4 | |a Testing | |
650 | 4 | |a Ethics | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878926 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP463 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP463 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793440198656 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477365 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP463 (OCoLC)1269392892 (DE-599)BVBBV047477365 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01834nmm a2200397zc 4500</leader><controlfield tag="001">BV047477365</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220217 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005277</subfield><subfield code="9">978-1-5090-0527-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP463</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269392892</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477365</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to penetration testing</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Penetration testing (or 'pen testing') is the process of testing a computer system, Web application or network to find vulnerabilities that could be exploited by an attacker. This course will discuss the concept of pen testing and what role it plays. Next, the course will review ethical hacking, as well as the legal and operational benefits of performing pen testing. Finally, the course will conclude with an overview of the Penetration Testing Execution Standard</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878926</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP463</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP463</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477365 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005277 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878926 |
oclc_num | 1269392892 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Introduction to penetration testing Sean Oriyano United States IEEE 2016 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) Penetration testing (or 'pen testing') is the process of testing a computer system, Web application or network to find vulnerabilities that could be exploited by an attacker. This course will discuss the concept of pen testing and what role it plays. Next, the course will review ethical hacking, as well as the legal and operational benefits of performing pen testing. Finally, the course will conclude with an overview of the Penetration Testing Execution Standard Computer security Internet Testing Ethics (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Introduction to penetration testing Computer security Internet Testing Ethics |
subject_GND | (DE-588)4017102-4 |
title | Introduction to penetration testing |
title_auth | Introduction to penetration testing |
title_exact_search | Introduction to penetration testing |
title_exact_search_txtP | Introduction to penetration testing |
title_full | Introduction to penetration testing Sean Oriyano |
title_fullStr | Introduction to penetration testing Sean Oriyano |
title_full_unstemmed | Introduction to penetration testing Sean Oriyano |
title_short | Introduction to penetration testing |
title_sort | introduction to penetration testing |
topic | Computer security Internet Testing Ethics |
topic_facet | Computer security Internet Testing Ethics Film |
work_keys_str_mv | AT oriyanosean introductiontopenetrationtesting |