Hacking & Security: the comprehensive guide to penetration testing and cybersecurity
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Rheinwerk Publishing
2023
Rheinwerk Computing 2023 |
Ausgabe: | 1. Auflage |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-863 DE-862 |
Beschreibung: | 1 Online-Ressource (2230 Seiten) |
ISBN: | 9781493224265 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV049097205 | ||
003 | DE-604 | ||
005 | 20231027 | ||
007 | cr|uuu---uuuuu | ||
008 | 230810s2023 gw o|||| 00||| eng d | ||
020 | |a 9781493224265 |c Online, pdf |9 978-1-4932-2426-5 | ||
035 | |a (OCoLC)1401181269 | ||
035 | |a (DE-599)BVBBV049097205 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-863 |a DE-862 |a DE-1050 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
084 | |8 1\p |a 004 |2 23sdnb | ||
100 | 1 | |a Kofler, Michael |d 1967- |e Verfasser |0 (DE-588)121636763 |4 aut | |
245 | 1 | 0 | |a Hacking & Security |b the comprehensive guide to penetration testing and cybersecurity |c Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Dr. Matthias Wübbeling |
250 | |a 1. Auflage | ||
264 | 1 | |a New York, NY |b Rheinwerk Publishing |c 2023 | |
264 | 1 | |b Rheinwerk Computing |c 2023 | |
300 | |a 1 Online-Ressource (2230 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Smartphone |0 (DE-588)4845922-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
653 | |a Penetration testing | ||
653 | |a Offline hacking | ||
653 | |a Active directory | ||
653 | |a Linux | ||
653 | |a Mobile and IoT security | ||
653 | |a Cloud security | ||
653 | |a IT forensics | ||
653 | |a Windows security | ||
653 | |a USB attacks | ||
653 | |a Software exploitation | ||
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 4 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 5 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 1 | 2 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 1 | 3 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 1 | 4 | |a Smartphone |0 (DE-588)4845922-7 |D s |
689 | 1 | 5 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Gebeshuber, Klaus |e Verfasser |0 (DE-588)1161609970 |4 aut | |
700 | 1 | |a Kloep, Peter |e Verfasser |0 (DE-588)1190658445 |4 aut | |
700 | 1 | |a Neugebauer, Frank |e Verfasser |0 (DE-588)143900641 |4 aut | |
700 | 1 | |a Zingsheim, André |e Verfasser |0 (DE-588)1199122130 |4 aut | |
700 | 1 | |a Hackner, Thomas |e Verfasser |0 (DE-588)1165103818 |4 aut | |
700 | 1 | |a Widl, Markus |e Verfasser |0 (DE-588)143202251 |4 aut | |
700 | 1 | |a Aigner, Ronald |d 1976- |e Verfasser |0 (DE-588)1146391021 |4 aut | |
700 | 1 | |a Kania, Stefan |d 1961- |e Verfasser |0 (DE-588)1051888980 |4 aut | |
700 | 1 | |a Scheible, Tobias |e Verfasser |0 (DE-588)1264312776 |4 aut | |
700 | 1 | |a Wübbeling, Matthias |e Verfasser |0 (DE-588)1202375871 |4 aut | |
710 | 2 | |a Galileo Press Inc. |0 (DE-588)106510992X |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4932-2425-8 |z 1-4932-2425-5 |
883 | 1 | |8 1\p |a vlb |d 20230314 |q DE-101 |u https://d-nb.info/provenance/plan#vlb | |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034358809 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30673923 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=30673923 |l DE-863 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=30673923 |l DE-862 |p ZDB-30-PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1050688 |
---|---|
_version_ | 1819742064342990848 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kofler, Michael 1967- Gebeshuber, Klaus Kloep, Peter Neugebauer, Frank Zingsheim, André Hackner, Thomas Widl, Markus Aigner, Ronald 1976- Kania, Stefan 1961- Scheible, Tobias Wübbeling, Matthias |
author_GND | (DE-588)121636763 (DE-588)1161609970 (DE-588)1190658445 (DE-588)143900641 (DE-588)1199122130 (DE-588)1165103818 (DE-588)143202251 (DE-588)1146391021 (DE-588)1051888980 (DE-588)1264312776 (DE-588)1202375871 |
author_facet | Kofler, Michael 1967- Gebeshuber, Klaus Kloep, Peter Neugebauer, Frank Zingsheim, André Hackner, Thomas Widl, Markus Aigner, Ronald 1976- Kania, Stefan 1961- Scheible, Tobias Wübbeling, Matthias |
author_role | aut aut aut aut aut aut aut aut aut aut aut |
author_sort | Kofler, Michael 1967- |
author_variant | m k mk k g kg p k pk f n fn a z az t h th m w mw r a ra s k sk t s ts m w mw |
building | Verbundindex |
bvnumber | BV049097205 |
classification_rvk | ST 277 ST 276 QH 500 |
collection | ZDB-30-PQE |
ctrlnum | (OCoLC)1401181269 (DE-599)BVBBV049097205 |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 1. Auflage |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008c 4500</leader><controlfield tag="001">BV049097205</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231027</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230810s2023 gw o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781493224265</subfield><subfield code="c">Online, pdf</subfield><subfield code="9">978-1-4932-2426-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401181269</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049097205</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kofler, Michael</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121636763</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking & Security</subfield><subfield code="b">the comprehensive guide to penetration testing and cybersecurity</subfield><subfield code="c">Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Dr. Matthias Wübbeling</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Rheinwerk Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Rheinwerk Computing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (2230 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Offline hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Active directory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Linux</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile and IoT security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT forensics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">USB attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software exploitation</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kloep, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1190658445</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neugebauer, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143900641</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zingsheim, André</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1199122130</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hackner, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1165103818</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widl, Markus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143202251</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aigner, Ronald</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1146391021</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kania, Stefan</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1051888980</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scheible, Tobias</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1264312776</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wübbeling, Matthias</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202375871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Galileo Press Inc.</subfield><subfield code="0">(DE-588)106510992X</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4932-2425-8</subfield><subfield code="z">1-4932-2425-5</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">vlb</subfield><subfield code="d">20230314</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#vlb</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034358809</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30673923</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=30673923</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=30673923</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049097205 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:31:36Z |
indexdate | 2024-12-29T04:01:08Z |
institution | BVB |
institution_GND | (DE-588)106510992X |
isbn | 9781493224265 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034358809 |
oclc_num | 1401181269 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-1050 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-1050 |
physical | 1 Online-Ressource (2230 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Rheinwerk Publishing Rheinwerk Computing |
record_format | marc |
spellingShingle | Kofler, Michael 1967- Gebeshuber, Klaus Kloep, Peter Neugebauer, Frank Zingsheim, André Hackner, Thomas Widl, Markus Aigner, Ronald 1976- Kania, Stefan 1961- Scheible, Tobias Wübbeling, Matthias Hacking & Security the comprehensive guide to penetration testing and cybersecurity Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)7742304-5 (DE-588)4752508-3 (DE-588)4142472-4 (DE-588)4116526-3 (DE-588)4274324-2 (DE-588)1058901281 (DE-588)4011144-1 (DE-588)4845922-7 (DE-588)4113821-1 (DE-588)4825817-9 |
title | Hacking & Security the comprehensive guide to penetration testing and cybersecurity |
title_auth | Hacking & Security the comprehensive guide to penetration testing and cybersecurity |
title_exact_search | Hacking & Security the comprehensive guide to penetration testing and cybersecurity |
title_exact_search_txtP | Hacking & Security the comprehensive guide to penetration testing and cybersecurity |
title_full | Hacking & Security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Dr. Matthias Wübbeling |
title_fullStr | Hacking & Security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Dr. Matthias Wübbeling |
title_full_unstemmed | Hacking & Security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Dr. Matthias Wübbeling |
title_short | Hacking & Security |
title_sort | hacking security the comprehensive guide to penetration testing and cybersecurity |
title_sub | the comprehensive guide to penetration testing and cybersecurity |
topic | Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Internet der Dinge Metasploit-Framework Softwareschwachstelle Angriff Softwarewerkzeug Computersicherheit Kali Linux Datensicherung Smartphone Hacker Penetrationstest |
work_keys_str_mv | AT koflermichael hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT gebeshuberklaus hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT kloeppeter hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT neugebauerfrank hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT zingsheimandre hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT hacknerthomas hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT widlmarkus hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT aignerronald hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT kaniastefan hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT scheibletobias hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT wubbelingmatthias hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT galileopressinc hackingsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity |