Hacked: the secrets behind cyber attacks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; New York ; New Delhi
Kogan Page
2024
|
Ausgabe: | 1. Auflage |
Schlagworte: | |
Online-Zugang: | Inhaltstext |
Beschreibung: | xiv, 284 Seiten 19.8 cm x 12.9 cm |
ISBN: | 9781398613706 1398613703 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049806845 | ||
003 | DE-604 | ||
005 | 20240812 | ||
007 | t | ||
008 | 240802s2024 xxk |||| 00||| eng d | ||
020 | |a 9781398613706 |9 978-1-3986-1370-6 | ||
020 | |a 1398613703 |9 1-3986-1370-3 | ||
024 | 3 | |a 9781398613706 | |
028 | 5 | 2 | |a Bestellnummer: 15313 |
035 | |a (OCoLC)1415867607 | ||
035 | |a (DE-599)BVBBV049806845 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-706 | ||
084 | |8 1\p |a 004 |2 23sdnb | ||
100 | 1 | |a Barker, Jessica |e Verfasser |0 (DE-588)1338427016 |4 aut | |
245 | 1 | 0 | |a Hacked |b the secrets behind cyber attacks |c Jessica Barker |
264 | 1 | |a London ; New York ; New Delhi |b Kogan Page |c 2024 | |
300 | |a xiv, 284 Seiten |c 19.8 cm x 12.9 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Cyber attacks | ||
653 | |a Cybersecurity strategies | ||
653 | |a hackers | ||
653 | |a expert | ||
653 | |a Safeguard | ||
653 | |a cyber threats | ||
653 | |a Ethical hackers insights | ||
653 | |a Mirai malware attack | ||
653 | |a Supply chain attack | ||
653 | |a Internet takedown | ||
653 | |a Data theft prevention | ||
653 | |a Ransomware protection | ||
653 | |a DDoS attack defense | ||
653 | |a Social engineering awareness | ||
653 | |a Cybersecurity knowledge | ||
653 | |a Protecting your business | ||
653 | |a Cyber attack stories | ||
653 | |a Cybersecurity insights | ||
653 | |a Online safety tips | ||
653 | |a Digital defense strategies | ||
653 | |a Cybersecurity best practices | ||
653 | |a Preventing data breaches | ||
653 | |a Cybersecurity education | ||
653 | |a Hacker tactics | ||
653 | |a Online privacy protection | ||
689 | 0 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
775 | 0 | 8 | |i Äquivalent |n Druck-Ausgabe, Hardcover |z 978-1-3986-1372-0 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-3986-1371-3 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=387adeb52e194f33a6ad7d98d0046754&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
883 | 1 | |8 1\p |a vlb |d 20240802 |q DE-101 |u https://d-nb.info/provenance/plan#vlb | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035147331 |
Datensatz im Suchindex
_version_ | 1809767273833955328 |
---|---|
adam_text | |
any_adam_object | |
author | Barker, Jessica |
author_GND | (DE-588)1338427016 |
author_facet | Barker, Jessica |
author_role | aut |
author_sort | Barker, Jessica |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV049806845 |
ctrlnum | (OCoLC)1415867607 (DE-599)BVBBV049806845 |
edition | 1. Auflage |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049806845</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240812</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240802s2024 xxk |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781398613706</subfield><subfield code="9">978-1-3986-1370-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1398613703</subfield><subfield code="9">1-3986-1370-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781398613706</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 15313</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1415867607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049806845</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barker, Jessica</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1338427016</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacked</subfield><subfield code="b">the secrets behind cyber attacks</subfield><subfield code="c">Jessica Barker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; New York ; New Delhi</subfield><subfield code="b">Kogan Page</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 284 Seiten</subfield><subfield code="c">19.8 cm x 12.9 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity strategies</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hackers</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">expert</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Safeguard</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber threats</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ethical hackers insights</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mirai malware attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Supply chain attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet takedown</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data theft prevention</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ransomware protection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DDoS attack defense</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social engineering awareness</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity knowledge</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Protecting your business</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber attack stories</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity insights</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Online safety tips</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital defense strategies</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity best practices</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Preventing data breaches</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity education</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacker tactics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Online privacy protection</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="775" ind1="0" ind2="8"><subfield code="i">Äquivalent</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-3986-1372-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-3986-1371-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=387adeb52e194f33a6ad7d98d0046754&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">vlb</subfield><subfield code="d">20240802</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#vlb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035147331</subfield></datafield></record></collection> |
id | DE-604.BV049806845 |
illustrated | Not Illustrated |
indexdate | 2024-09-10T00:36:07Z |
institution | BVB |
isbn | 9781398613706 1398613703 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035147331 |
oclc_num | 1415867607 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | xiv, 284 Seiten 19.8 cm x 12.9 cm |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Kogan Page |
record_format | marc |
spelling | Barker, Jessica Verfasser (DE-588)1338427016 aut Hacked the secrets behind cyber attacks Jessica Barker London ; New York ; New Delhi Kogan Page 2024 xiv, 284 Seiten 19.8 cm x 12.9 cm txt rdacontent n rdamedia nc rdacarrier Cyberattacke (DE-588)1075612675 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cyber attacks Cybersecurity strategies hackers expert Safeguard cyber threats Ethical hackers insights Mirai malware attack Supply chain attack Internet takedown Data theft prevention Ransomware protection DDoS attack defense Social engineering awareness Cybersecurity knowledge Protecting your business Cyber attack stories Cybersecurity insights Online safety tips Digital defense strategies Cybersecurity best practices Preventing data breaches Cybersecurity education Hacker tactics Online privacy protection Cyberattacke (DE-588)1075612675 s Computersicherheit (DE-588)4274324-2 s DE-604 Äquivalent Druck-Ausgabe, Hardcover 978-1-3986-1372-0 Erscheint auch als Online-Ausgabe 978-1-3986-1371-3 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=387adeb52e194f33a6ad7d98d0046754&prov=M&dok_var=1&dok_ext=htm Inhaltstext 1\p vlb 20240802 DE-101 https://d-nb.info/provenance/plan#vlb |
spellingShingle | Barker, Jessica Hacked the secrets behind cyber attacks Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)1075612675 (DE-588)4274324-2 |
title | Hacked the secrets behind cyber attacks |
title_auth | Hacked the secrets behind cyber attacks |
title_exact_search | Hacked the secrets behind cyber attacks |
title_full | Hacked the secrets behind cyber attacks Jessica Barker |
title_fullStr | Hacked the secrets behind cyber attacks Jessica Barker |
title_full_unstemmed | Hacked the secrets behind cyber attacks Jessica Barker |
title_short | Hacked |
title_sort | hacked the secrets behind cyber attacks |
title_sub | the secrets behind cyber attacks |
topic | Cyberattacke (DE-588)1075612675 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Cyberattacke Computersicherheit |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=387adeb52e194f33a6ad7d98d0046754&prov=M&dok_var=1&dok_ext=htm |
work_keys_str_mv | AT barkerjessica hackedthesecretsbehindcyberattacks |