Ethical hacking: session hijacking
Session hijacking can be characterized as one of the most sophisticated forms of attack. Hackers can take over the true interactions of unsuspecting users in order to gain access to data and systems to perform an inside attack on an organization. In this course we will learn how to target and take o...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2017
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | Session hijacking can be characterized as one of the most sophisticated forms of attack. Hackers can take over the true interactions of unsuspecting users in order to gain access to data and systems to perform an inside attack on an organization. In this course we will learn how to target and take over an existing communication or session between two systems. We will see how to use session hijacking to attack network communication as well as use it to shut down a target |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005307 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477368 | ||
003 | DE-604 | ||
005 | 20220216 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781509005307 |9 978-1-5090-0530-7 | ||
035 | |a (ZDB-37-ICG)EDP466 | ||
035 | |a (OCoLC)1269392452 | ||
035 | |a (DE-599)BVBBV047477368 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ethical hacking |b session hijacking |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2017 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a Session hijacking can be characterized as one of the most sophisticated forms of attack. Hackers can take over the true interactions of unsuspecting users in order to gain access to data and systems to perform an inside attack on an organization. In this course we will learn how to target and take over an existing communication or session between two systems. We will see how to use session hijacking to attack network communication as well as use it to shut down a target | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Privacy | |
650 | 4 | |a Ethics | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878929 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP466 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP466 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793447538688 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477368 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP466 (OCoLC)1269392452 (DE-599)BVBBV047477368 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01816nmm a2200385zc 4500</leader><controlfield tag="001">BV047477368</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220216 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005307</subfield><subfield code="9">978-1-5090-0530-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP466</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269392452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477368</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">session hijacking</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Session hijacking can be characterized as one of the most sophisticated forms of attack. Hackers can take over the true interactions of unsuspecting users in order to gain access to data and systems to perform an inside attack on an organization. In this course we will learn how to target and take over an existing communication or session between two systems. We will see how to use session hijacking to attack network communication as well as use it to shut down a target</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878929</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP466</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP466</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477368 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005307 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878929 |
oclc_num | 1269392452 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Ethical hacking session hijacking Sean Oriyano United States IEEE 2017 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) Session hijacking can be characterized as one of the most sophisticated forms of attack. Hackers can take over the true interactions of unsuspecting users in order to gain access to data and systems to perform an inside attack on an organization. In this course we will learn how to target and take over an existing communication or session between two systems. We will see how to use session hijacking to attack network communication as well as use it to shut down a target Computer security Privacy Ethics (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Ethical hacking session hijacking Computer security Privacy Ethics |
subject_GND | (DE-588)4017102-4 |
title | Ethical hacking session hijacking |
title_auth | Ethical hacking session hijacking |
title_exact_search | Ethical hacking session hijacking |
title_exact_search_txtP | Ethical hacking session hijacking |
title_full | Ethical hacking session hijacking Sean Oriyano |
title_fullStr | Ethical hacking session hijacking Sean Oriyano |
title_full_unstemmed | Ethical hacking session hijacking Sean Oriyano |
title_short | Ethical hacking |
title_sort | ethical hacking session hijacking |
title_sub | session hijacking |
topic | Computer security Privacy Ethics |
topic_facet | Computer security Privacy Ethics Film |
work_keys_str_mv | AT oriyanosean ethicalhackingsessionhijacking |