Wireless penetration testing: up and running: run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Published by BPB Online
2023
|
Schlagworte: | |
Beschreibung: | xix, 281 Seiten Illustrationen, Diagramme |
ISBN: | 9789355512741 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049518053 | ||
003 | DE-604 | ||
005 | 20240202 | ||
007 | t | ||
008 | 240125s2023 a||| |||| 00||| eng d | ||
020 | |a 9789355512741 |9 978-93-5551-274-1 | ||
035 | |a (OCoLC)1422488681 | ||
035 | |a (DE-599)BVBBV049518053 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a El Fiky, Ahmed Hashem |e Verfasser |4 aut | |
245 | 1 | 0 | |a Wireless penetration testing: up and running |b run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols |c Dr. Ahmed Hashem El Fiky |
264 | 1 | |a London |b Published by BPB Online |c 2023 | |
300 | |a xix, 281 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034863951 |
Datensatz im Suchindex
_version_ | 1804186337843085312 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | El Fiky, Ahmed Hashem |
author_facet | El Fiky, Ahmed Hashem |
author_role | aut |
author_sort | El Fiky, Ahmed Hashem |
author_variant | f a h e fah fahe |
building | Verbundindex |
bvnumber | BV049518053 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1422488681 (DE-599)BVBBV049518053 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01368nam a2200349 c 4500</leader><controlfield tag="001">BV049518053</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240202 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240125s2023 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789355512741</subfield><subfield code="9">978-93-5551-274-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1422488681</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049518053</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">El Fiky, Ahmed Hashem</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless penetration testing: up and running</subfield><subfield code="b">run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols</subfield><subfield code="c">Dr. Ahmed Hashem El Fiky</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Published by BPB Online</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xix, 281 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034863951</subfield></datafield></record></collection> |
id | DE-604.BV049518053 |
illustrated | Illustrated |
index_date | 2024-07-03T23:24:23Z |
indexdate | 2024-07-10T10:09:32Z |
institution | BVB |
isbn | 9789355512741 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034863951 |
oclc_num | 1422488681 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | xix, 281 Seiten Illustrationen, Diagramme |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Published by BPB Online |
record_format | marc |
spelling | El Fiky, Ahmed Hashem Verfasser aut Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols Dr. Ahmed Hashem El Fiky London Published by BPB Online 2023 xix, 281 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Softwareschwachstelle (DE-588)4752508-3 s Computersicherheit (DE-588)4274324-2 s DE-604 |
spellingShingle | El Fiky, Ahmed Hashem Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols Computersicherheit (DE-588)4274324-2 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4752508-3 (DE-588)4633975-9 |
title | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols |
title_auth | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols |
title_exact_search | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols |
title_exact_search_txtP | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols |
title_full | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols Dr. Ahmed Hashem El Fiky |
title_fullStr | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols Dr. Ahmed Hashem El Fiky |
title_full_unstemmed | Wireless penetration testing: up and running run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols Dr. Ahmed Hashem El Fiky |
title_short | Wireless penetration testing: up and running |
title_sort | wireless penetration testing up and running run wireless networks vulnerability assessment wi fi pen testing android and ios application security and break wep wpa and wpa2 protocols |
title_sub | run wireless networks vulnerability assessment, wi-fi pen testing, android and iOS application security, and break WEP, WPA, and WPA2 protocols |
topic | Computersicherheit (DE-588)4274324-2 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
topic_facet | Computersicherheit Softwareschwachstelle Drahtloses lokales Netz |
work_keys_str_mv | AT elfikyahmedhashem wirelesspenetrationtestingupandrunningrunwirelessnetworksvulnerabilityassessmentwifipentestingandroidandiosapplicationsecurityandbreakwepwpaandwpa2protocols |