The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2024
Berkeley, CA |
Ausgabe: | 1st ed. 2024 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-1043 DE-1046 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-860 DE-1049 DE-863 DE-862 DE-523 DE-20 DE-706 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (XIII, 306 p. 21 illus) |
ISBN: | 9798868801747 |
DOI: | 10.1007/979-8-8688-0174-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049780998 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240715s2024 |||| o||u| ||||||eng d | ||
020 | |a 9798868801747 |c Online |9 979-88-6880-174-7 | ||
024 | 7 | |a 10.1007/979-8-8688-0174-7 |2 doi | |
035 | |a (ZDB-2-CWD)9798868801747 | ||
035 | |a (OCoLC)1446264443 | ||
035 | |a (DE-599)BVBBV049780998 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-523 |a DE-1049 |a DE-863 |a DE-1050 |a DE-20 |a DE-1051 |a DE-862 |a DE-92 |a DE-522 |a DE-573 |a DE-M347 |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Butler, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Business of Hacking |b Creating, Developing, and Maintaining an Effective Penetration Testing Team |c by Michael Butler, Jacob G. Oakley |
250 | |a 1st ed. 2024 | ||
264 | 1 | |a Berkeley, CA |b Apress |c 2024 | |
264 | 1 | |a Berkeley, CA |b Apress | |
300 | |a 1 Online-Ressource (XIII, 306 p. 21 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Security Services | |
650 | 4 | |a IT Risk Management | |
650 | 4 | |a Privacy | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Risk management | |
650 | 4 | |a Data protection / Law and legislation | |
700 | 1 | |a Oakley, Jacob G. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 979-88-6880-173-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 979-88-6880-175-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/979-8-8688-0174-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2024 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035121979 | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-522 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-1043 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-1046 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-Aug4 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-1050 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-573 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-M347 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-92 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-1051 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-898 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-860 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-1049 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-863 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-862 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-523 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-20 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/979-8-8688-0174-7 |l DE-706 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1079828 |
---|---|
_version_ | 1806528790990422016 |
adam_text | |
any_adam_object | |
author | Butler, Michael Oakley, Jacob G. |
author_facet | Butler, Michael Oakley, Jacob G. |
author_role | aut aut |
author_sort | Butler, Michael |
author_variant | m b mb j g o jg jgo |
building | Verbundindex |
bvnumber | BV049780998 |
classification_tum | DAT 000 |
collection | ZDB-2-CWD |
ctrlnum | (ZDB-2-CWD)9798868801747 (OCoLC)1446264443 (DE-599)BVBBV049780998 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/979-8-8688-0174-7 |
edition | 1st ed. 2024 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV049780998</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240715s2024 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798868801747</subfield><subfield code="c">Online</subfield><subfield code="9">979-88-6880-174-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/979-8-8688-0174-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9798868801747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1446264443</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049780998</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Butler, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Business of Hacking</subfield><subfield code="b">Creating, Developing, and Maintaining an Effective Penetration Testing Team</subfield><subfield code="c">by Michael Butler, Jacob G. Oakley</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 306 p. 21 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Law and legislation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oakley, Jacob G.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">979-88-6880-173-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">979-88-6880-175-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035121979</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-1051</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/979-8-8688-0174-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049780998 |
illustrated | Not Illustrated |
indexdate | 2024-08-05T08:41:49Z |
institution | BVB |
isbn | 9798868801747 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035121979 |
oclc_num | 1446264443 |
open_access_boolean | |
owner | DE-860 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-523 DE-1049 DE-863 DE-BY-FWS DE-1050 DE-20 DE-1051 DE-862 DE-BY-FWS DE-92 DE-522 DE-573 DE-M347 DE-706 |
owner_facet | DE-860 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-523 DE-1049 DE-863 DE-BY-FWS DE-1050 DE-20 DE-1051 DE-862 DE-BY-FWS DE-92 DE-522 DE-573 DE-M347 DE-706 |
physical | 1 Online-Ressource (XIII, 306 p. 21 illus) |
psigel | ZDB-2-CWD ZDB-2-CWD_2024 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Apress |
record_format | marc |
spellingShingle | Butler, Michael Oakley, Jacob G. The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team Data and Information Security Computer Crime Security Services IT Risk Management Privacy Data protection Computer crimes Risk management Data protection / Law and legislation |
title | The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team |
title_auth | The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team |
title_exact_search | The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team |
title_full | The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team by Michael Butler, Jacob G. Oakley |
title_fullStr | The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team by Michael Butler, Jacob G. Oakley |
title_full_unstemmed | The Business of Hacking Creating, Developing, and Maintaining an Effective Penetration Testing Team by Michael Butler, Jacob G. Oakley |
title_short | The Business of Hacking |
title_sort | the business of hacking creating developing and maintaining an effective penetration testing team |
title_sub | Creating, Developing, and Maintaining an Effective Penetration Testing Team |
topic | Data and Information Security Computer Crime Security Services IT Risk Management Privacy Data protection Computer crimes Risk management Data protection / Law and legislation |
topic_facet | Data and Information Security Computer Crime Security Services IT Risk Management Privacy Data protection Computer crimes Risk management Data protection / Law and legislation |
url | https://doi.org/10.1007/979-8-8688-0174-7 |
work_keys_str_mv | AT butlermichael thebusinessofhackingcreatingdevelopingandmaintaininganeffectivepenetrationtestingteam AT oakleyjacobg thebusinessofhackingcreatingdevelopingandmaintaininganeffectivepenetrationtestingteam |