Ethical hacking: evasion techniques
Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2017
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005321 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477370 | ||
003 | DE-604 | ||
005 | 20220216 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781509005321 |9 978-1-5090-0532-1 | ||
035 | |a (ZDB-37-ICG)EDP468 | ||
035 | |a (OCoLC)1269388938 | ||
035 | |a (DE-599)BVBBV047477370 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ethical hacking |b evasion techniques |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2017 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Security | |
650 | 4 | |a Authentication | |
650 | 4 | |a Ethics | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878931 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP468 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP468 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793443344384 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477370 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP468 (OCoLC)1269388938 (DE-599)BVBBV047477370 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01626nmm a2200397zc 4500</leader><controlfield tag="001">BV047477370</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220216 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005321</subfield><subfield code="9">978-1-5090-0532-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269388938</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477370</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">evasion techniques</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethics</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878931</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP468</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP468</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477370 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005321 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878931 |
oclc_num | 1269388938 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Ethical hacking evasion techniques Sean Oriyano United States IEEE 2017 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions Computer security Security Authentication Ethics (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Ethical hacking evasion techniques Computer security Security Authentication Ethics |
subject_GND | (DE-588)4017102-4 |
title | Ethical hacking evasion techniques |
title_auth | Ethical hacking evasion techniques |
title_exact_search | Ethical hacking evasion techniques |
title_exact_search_txtP | Ethical hacking evasion techniques |
title_full | Ethical hacking evasion techniques Sean Oriyano |
title_fullStr | Ethical hacking evasion techniques Sean Oriyano |
title_full_unstemmed | Ethical hacking evasion techniques Sean Oriyano |
title_short | Ethical hacking |
title_sort | ethical hacking evasion techniques |
title_sub | evasion techniques |
topic | Computer security Security Authentication Ethics |
topic_facet | Computer security Security Authentication Ethics Film |
work_keys_str_mv | AT oriyanosean ethicalhackingevasiontechniques |