Hacking & Security: das umfassende Handbuch
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | German |
Veröffentlicht: |
Bonn
Rheinwerk
2023
|
Ausgabe: | 3., aktualisierte und erweiterte Auflage |
Schriftenreihe: | Rheinwerk Computing
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-92 DE-863 DE-862 |
Beschreibung: | Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Penetration Tests und Defense mit Kali Linux, Metasploit, hydra, OpenVAS, Empire, Snort und mehr" |
Beschreibung: | 1 Online-Ressource (1200 Seiten) Illustrationen, Diagramme |
ISBN: | 9783836291668 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV048853217 | ||
003 | DE-604 | ||
005 | 20240430 | ||
007 | cr|uuu---uuuuu | ||
008 | 230309s2023 gw a||| o|||| 00||| ger d | ||
020 | |a 9783836291668 |9 978-3-8362-9166-8 | ||
035 | |a (OCoLC)1372482140 | ||
035 | |a (DE-599)BVBBV048853217 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a gw |c XA-DE-NW | ||
049 | |a DE-863 |a DE-862 |a DE-92 |a DE-1050 |a DE-83 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Aigner, Ronald |d 1976- |0 (DE-588)1146391021 |4 aut | |
245 | 1 | 0 | |a Hacking & Security |b das umfassende Handbuch |c Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Scheible, Widl, Wübbeling, Zingsheim |
246 | 1 | 3 | |a Hacking und Security |
250 | |a 3., aktualisierte und erweiterte Auflage | ||
264 | 1 | |a Bonn |b Rheinwerk |c 2023 | |
300 | |a 1 Online-Ressource (1200 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rheinwerk Computing | |
500 | |a Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Penetration Tests und Defense mit Kali Linux, Metasploit, hydra, OpenVAS, Empire, Snort und mehr" | ||
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Smartphone |0 (DE-588)4845922-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
653 | |a Network Netzwerk Hacker Hacken Hacking | ||
653 | |a Tools IT-Sicherheit Security | ||
653 | |a Root-Kits | ||
653 | |a Penetration-Tests Pen-Tests | ||
653 | |a Kali-Linux | ||
653 | |a Meltdown Spectre | ||
653 | |a Hand-Buch Bücher lernen Grundlagen Workshops Kurse Wissen Training IT-Ausbildung Seminare | ||
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Smartphone |0 (DE-588)4845922-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 5 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 5 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 5 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 5 | 4 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 5 | 5 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 5 | |5 DE-604 | |
700 | 1 | |a Gebeshuber, Klaus |0 (DE-588)1161609970 |4 aut | |
700 | 1 | |a Hackner, Thomas |0 (DE-588)1165103818 |4 aut | |
700 | 1 | |a Kania, Stefan |d 1961- |0 (DE-588)1051888980 |4 aut | |
700 | 1 | |a Kloep, Peter |0 (DE-588)1190658445 |4 aut | |
700 | 1 | |a Kofler, Michael |d 1967- |0 (DE-588)121636763 |4 aut | |
700 | 1 | |a Neugebauer, Frank |0 (DE-588)143900641 |4 aut | |
700 | 1 | |a Scheible, Tobias |0 (DE-588)1264312776 |4 aut | |
700 | 1 | |a Widl, Markus |0 (DE-588)143202251 |4 aut | |
700 | 1 | |a Wübbeling, Matthias |0 (DE-588)1202375871 |4 aut | |
700 | 1 | |a Zingsheim, André |0 (DE-588)1199122130 |4 aut | |
710 | 2 | |a Rheinwerk Verlag |0 (DE-588)1081738405 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-8362-9164-4 |z 3-8362-9164-9 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034118451 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=7152444 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/thnuernberg/detail.action?docID=7152444 |l DE-92 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=7152444 |l DE-863 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=7152444 |l DE-862 |p ZDB-30-PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1033207 |
---|---|
_version_ | 1819742064285319168 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Aigner, Ronald 1976- Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Scheible, Tobias Widl, Markus Wübbeling, Matthias Zingsheim, André |
author_GND | (DE-588)1146391021 (DE-588)1161609970 (DE-588)1165103818 (DE-588)1051888980 (DE-588)1190658445 (DE-588)121636763 (DE-588)143900641 (DE-588)1264312776 (DE-588)143202251 (DE-588)1202375871 (DE-588)1199122130 |
author_facet | Aigner, Ronald 1976- Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Scheible, Tobias Widl, Markus Wübbeling, Matthias Zingsheim, André |
author_role | aut aut aut aut aut aut aut aut aut aut aut |
author_sort | Aigner, Ronald 1976- |
author_variant | r a ra k g kg t h th s k sk p k pk m k mk f n fn t s ts m w mw m w mw a z az |
building | Verbundindex |
bvnumber | BV048853217 |
classification_rvk | ST 277 ST 276 |
collection | ZDB-30-PQE |
ctrlnum | (OCoLC)1372482140 (DE-599)BVBBV048853217 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 3., aktualisierte und erweiterte Auflage |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008c 4500</leader><controlfield tag="001">BV048853217</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240430</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230309s2023 gw a||| o|||| 00||| ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836291668</subfield><subfield code="9">978-3-8362-9166-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1372482140</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048853217</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aigner, Ronald</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1146391021</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking & Security</subfield><subfield code="b">das umfassende Handbuch</subfield><subfield code="c">Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Scheible, Widl, Wübbeling, Zingsheim</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking und Security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3., aktualisierte und erweiterte Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1200 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk Computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "Schwachstellen verstehen, Angriffsvektoren identifizieren ; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT ; Penetration Tests und Defense mit Kali Linux, Metasploit, hydra, OpenVAS, Empire, Snort und mehr"</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network Netzwerk Hacker Hacken Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Tools IT-Sicherheit Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Root-Kits</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration-Tests Pen-Tests</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kali-Linux</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Meltdown Spectre</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hand-Buch Bücher lernen Grundlagen Workshops Kurse Wissen Training IT-Ausbildung Seminare</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="4"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="5"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hackner, Thomas</subfield><subfield code="0">(DE-588)1165103818</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kania, Stefan</subfield><subfield code="d">1961-</subfield><subfield code="0">(DE-588)1051888980</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kloep, Peter</subfield><subfield code="0">(DE-588)1190658445</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kofler, Michael</subfield><subfield code="d">1967-</subfield><subfield code="0">(DE-588)121636763</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neugebauer, Frank</subfield><subfield code="0">(DE-588)143900641</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scheible, Tobias</subfield><subfield code="0">(DE-588)1264312776</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widl, Markus</subfield><subfield code="0">(DE-588)143202251</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wübbeling, Matthias</subfield><subfield code="0">(DE-588)1202375871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zingsheim, André</subfield><subfield code="0">(DE-588)1199122130</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rheinwerk Verlag</subfield><subfield code="0">(DE-588)1081738405</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-8362-9164-4</subfield><subfield code="z">3-8362-9164-9</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034118451</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=7152444</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/thnuernberg/detail.action?docID=7152444</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=7152444</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=7152444</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048853217 |
illustrated | Illustrated |
index_date | 2024-07-03T21:40:45Z |
indexdate | 2024-12-29T04:01:08Z |
institution | BVB |
institution_GND | (DE-588)1081738405 |
isbn | 9783836291668 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034118451 |
oclc_num | 1372482140 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-92 DE-1050 DE-83 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-92 DE-1050 DE-83 |
physical | 1 Online-Ressource (1200 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Rheinwerk |
record_format | marc |
series2 | Rheinwerk Computing |
spellingShingle | Aigner, Ronald 1976- Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Scheible, Tobias Widl, Markus Wübbeling, Matthias Zingsheim, André Hacking & Security das umfassende Handbuch Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Angriff (DE-588)4142472-4 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)7742304-5 (DE-588)4752508-3 (DE-588)4116526-3 (DE-588)4274324-2 (DE-588)4142472-4 (DE-588)1058901281 (DE-588)4011144-1 (DE-588)4845922-7 (DE-588)4825817-9 (DE-588)4113821-1 |
title | Hacking & Security das umfassende Handbuch |
title_alt | Hacking und Security |
title_auth | Hacking & Security das umfassende Handbuch |
title_exact_search | Hacking & Security das umfassende Handbuch |
title_exact_search_txtP | Hacking & Security das umfassende Handbuch |
title_full | Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Scheible, Widl, Wübbeling, Zingsheim |
title_fullStr | Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Scheible, Widl, Wübbeling, Zingsheim |
title_full_unstemmed | Hacking & Security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Scheible, Widl, Wübbeling, Zingsheim |
title_short | Hacking & Security |
title_sort | hacking security das umfassende handbuch |
title_sub | das umfassende Handbuch |
topic | Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Angriff (DE-588)4142472-4 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | Internet der Dinge Metasploit-Framework Softwareschwachstelle Softwarewerkzeug Computersicherheit Angriff Kali Linux Datensicherung Smartphone Penetrationstest Hacker |
work_keys_str_mv | AT aignerronald hackingsecuritydasumfassendehandbuch AT gebeshuberklaus hackingsecuritydasumfassendehandbuch AT hacknerthomas hackingsecuritydasumfassendehandbuch AT kaniastefan hackingsecuritydasumfassendehandbuch AT kloeppeter hackingsecuritydasumfassendehandbuch AT koflermichael hackingsecuritydasumfassendehandbuch AT neugebauerfrank hackingsecuritydasumfassendehandbuch AT scheibletobias hackingsecuritydasumfassendehandbuch AT widlmarkus hackingsecuritydasumfassendehandbuch AT wubbelingmatthias hackingsecuritydasumfassendehandbuch AT zingsheimandre hackingsecuritydasumfassendehandbuch AT rheinwerkverlag hackingsecuritydasumfassendehandbuch AT aignerronald hackingundsecurity AT gebeshuberklaus hackingundsecurity AT hacknerthomas hackingundsecurity AT kaniastefan hackingundsecurity AT kloeppeter hackingundsecurity AT koflermichael hackingundsecurity AT neugebauerfrank hackingundsecurity AT scheibletobias hackingundsecurity AT widlmarkus hackingundsecurity AT wubbelingmatthias hackingundsecurity AT zingsheimandre hackingundsecurity AT rheinwerkverlag hackingundsecurity |