Perspectives on ethical hacking and penetration testing:
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges,...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2023]
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-706 DE-83 DE-898 DE-1050 URL des Erstveröffentlichers |
Zusammenfassung: | Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis.Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. |
Beschreibung: | 1 Online-Ressource (xx, 445 Seiten) |
ISBN: | 9781668482209 |
DOI: | 10.4018/978-1-6684-8218-6 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049327257 | ||
003 | DE-604 | ||
005 | 20231006 | ||
007 | cr|uuu---uuuuu | ||
008 | 230914s2023 xx o|||| 00||| eng d | ||
020 | |a 9781668482209 |9 978-1-66848-220-9 | ||
024 | 7 | |a 10.4018/978-1-6684-8218-6 |2 doi | |
035 | |a (ZDB-98-IGB)00312214 | ||
035 | |a (ZDB-98-IGB)9781668482209 | ||
035 | |a (OCoLC)1401209452 | ||
035 | |a (DE-599)BVBBV049327257 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-706 |a DE-83 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Perspectives on ethical hacking and penetration testing |c Keshav Kaushik, Akashdeep Bhardwaj, editors |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2023] | |
300 | |a 1 Online-Ressource (xx, 445 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis.Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. | ||
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bhardwaj, Akashdeep |d 1971- |0 (DE-588)1284516636 |4 edt | |
700 | 1 | |a Kaushik, Keshav |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668482186 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668482185 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-8218-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034588093 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8218-6 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8218-6 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8218-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8218-6 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-8218-6 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715326561386496 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Bhardwaj, Akashdeep 1971- Kaushik, Keshav |
author2_role | edt edt |
author2_variant | a b ab k k kk |
author_GND | (DE-588)1284516636 |
author_facet | Bhardwaj, Akashdeep 1971- Kaushik, Keshav |
building | Verbundindex |
bvnumber | BV049327257 |
classification_rvk | ST 277 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00312214 (ZDB-98-IGB)9781668482209 (OCoLC)1401209452 (DE-599)BVBBV049327257 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-8218-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049327257</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231006</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230914s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668482209</subfield><subfield code="9">978-1-66848-220-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-8218-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00312214</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)9781668482209</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401209452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049327257</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Perspectives on ethical hacking and penetration testing</subfield><subfield code="c">Keshav Kaushik, Akashdeep Bhardwaj, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 445 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis.Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhardwaj, Akashdeep</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)1284516636</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaushik, Keshav</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668482186</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668482185</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-8218-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034588093</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8218-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8218-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8218-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8218-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-8218-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049327257 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:44:33Z |
indexdate | 2024-12-17T19:01:35Z |
institution | BVB |
isbn | 9781668482209 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034588093 |
oclc_num | 1401209452 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-706 DE-83 DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-706 DE-83 DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (xx, 445 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2023 ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
spelling | Perspectives on ethical hacking and penetration testing Keshav Kaushik, Akashdeep Bhardwaj, editors Hershey PA, USA IGI Global [2023] 1 Online-Ressource (xx, 445 Seiten) txt rdacontent c rdamedia cr rdacarrier Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis.Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. Computer crimes Prevention Penetration testing (Computer security) Computer security Social Engineering Sicherheit (DE-588)7539699-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Social Engineering Sicherheit (DE-588)7539699-3 s DE-604 Bhardwaj, Akashdeep 1971- (DE-588)1284516636 edt Kaushik, Keshav edt Erscheint auch als Druck-Ausgabe 9781668482186 Erscheint auch als Druck-Ausgabe 1668482185 https://doi.org/10.4018/978-1-6684-8218-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Perspectives on ethical hacking and penetration testing Computer crimes Prevention Penetration testing (Computer security) Computer security Social Engineering Sicherheit (DE-588)7539699-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7539699-3 (DE-588)4274324-2 |
title | Perspectives on ethical hacking and penetration testing |
title_auth | Perspectives on ethical hacking and penetration testing |
title_exact_search | Perspectives on ethical hacking and penetration testing |
title_exact_search_txtP | Perspectives on ethical hacking and penetration testing |
title_full | Perspectives on ethical hacking and penetration testing Keshav Kaushik, Akashdeep Bhardwaj, editors |
title_fullStr | Perspectives on ethical hacking and penetration testing Keshav Kaushik, Akashdeep Bhardwaj, editors |
title_full_unstemmed | Perspectives on ethical hacking and penetration testing Keshav Kaushik, Akashdeep Bhardwaj, editors |
title_short | Perspectives on ethical hacking and penetration testing |
title_sort | perspectives on ethical hacking and penetration testing |
topic | Computer crimes Prevention Penetration testing (Computer security) Computer security Social Engineering Sicherheit (DE-588)7539699-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer crimes Prevention Penetration testing (Computer security) Computer security Social Engineering Sicherheit Computersicherheit |
url | https://doi.org/10.4018/978-1-6684-8218-6 |
work_keys_str_mv | AT bhardwajakashdeep perspectivesonethicalhackingandpenetrationtesting AT kaushikkeshav perspectivesonethicalhackingandpenetrationtesting |