Penetration Testing with Raspberry Pi - Second Edition.:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Packt Publishing,
2016.
|
Ausgabe: | 2. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Beschreibung: | 1 online resource (316) |
ISBN: | 1787126234 9781787126237 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn965718030 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 161209s2016 xx o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d N$T |d OCLCF |d OCLCQ |d OCLCO |d TEFOD |d OCLCQ |d OCLCO |d G3B |d IGB |d STF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 1787126234 |q (electronic bk.) | ||
020 | |a 9781787126237 |q (electronic bk.) | ||
035 | |a (OCoLC)965718030 | ||
037 | |a 974338 |b MIL | ||
037 | |a 9426B908-D965-40A9-8A0A-7B65ECD9C899 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b M37 2016eb | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.2 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a McPhee, Michael. | |
245 | 1 | 0 | |a Penetration Testing with Raspberry Pi - Second Edition. |
250 | |a 2. | ||
260 | |b Packt Publishing, |c 2016. | ||
300 | |a 1 online resource (316) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Raspberry Pi (Computer) |0 http://id.loc.gov/authorities/subjects/sh2013000263 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Raspberry Pi (Ordinateur) | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Raspberry Pi (Computer) |2 fast | |
758 | |i has work: |a Penetration Testing with Raspberry Pi - Second Edition (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXRM3bFyYPYvCxpcKyWwfq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1430772 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1430772 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1430772 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis36498403 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn965718030 |
---|---|
_version_ | 1826942135885103104 |
adam_text | |
any_adam_object | |
author | McPhee, Michael |
author_facet | McPhee, Michael |
author_role | |
author_sort | McPhee, Michael |
author_variant | m m mm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 M37 2016eb |
callnumber-search | QA76.9.A25 M37 2016eb |
callnumber-sort | QA 276.9 A25 M37 42016EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)965718030 |
dewey-full | 004.2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.2 |
dewey-search | 004.2 |
dewey-sort | 14.2 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02618cam a2200637Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn965718030</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">161209s2016 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">G3B</subfield><subfield code="d">IGB</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787126234</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787126237</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)965718030</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">974338</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9426B908-D965-40A9-8A0A-7B65ECD9C899</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">M37 2016eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.2</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McPhee, Michael.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration Testing with Raspberry Pi - Second Edition.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Packt Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (316)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Raspberry Pi (Computer)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000263</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Raspberry Pi (Ordinateur)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Raspberry Pi (Computer)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Penetration Testing with Raspberry Pi - Second Edition (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXRM3bFyYPYvCxpcKyWwfq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1430772</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1430772</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1430772</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis36498403</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn965718030 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:23:12Z |
institution | BVB |
isbn | 1787126234 9781787126237 |
language | English |
oclc_num | 965718030 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (316) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
spelling | McPhee, Michael. Penetration Testing with Raspberry Pi - Second Edition. 2. Packt Publishing, 2016. 1 online resource (316) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Raspberry Pi (Computer) http://id.loc.gov/authorities/subjects/sh2013000263 Tests d'intrusion. Raspberry Pi (Ordinateur) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Penetration testing (Computer security) fast Raspberry Pi (Computer) fast has work: Penetration Testing with Raspberry Pi - Second Edition (Text) https://id.oclc.org/worldcat/entity/E39PCXRM3bFyYPYvCxpcKyWwfq https://id.oclc.org/worldcat/ontology/hasWork |
spellingShingle | McPhee, Michael Penetration Testing with Raspberry Pi - Second Edition. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Raspberry Pi (Computer) http://id.loc.gov/authorities/subjects/sh2013000263 Tests d'intrusion. Raspberry Pi (Ordinateur) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Penetration testing (Computer security) fast Raspberry Pi (Computer) fast |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh2013000263 |
title | Penetration Testing with Raspberry Pi - Second Edition. |
title_auth | Penetration Testing with Raspberry Pi - Second Edition. |
title_exact_search | Penetration Testing with Raspberry Pi - Second Edition. |
title_full | Penetration Testing with Raspberry Pi - Second Edition. |
title_fullStr | Penetration Testing with Raspberry Pi - Second Edition. |
title_full_unstemmed | Penetration Testing with Raspberry Pi - Second Edition. |
title_short | Penetration Testing with Raspberry Pi - Second Edition. |
title_sort | penetration testing with raspberry pi second edition |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Raspberry Pi (Computer) http://id.loc.gov/authorities/subjects/sh2013000263 Tests d'intrusion. Raspberry Pi (Ordinateur) COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Penetration testing (Computer security) fast Raspberry Pi (Computer) fast |
topic_facet | Kali Linux. Kali Linux Penetration testing (Computer security) Raspberry Pi (Computer) Tests d'intrusion. Raspberry Pi (Ordinateur) COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. |
work_keys_str_mv | AT mcpheemichael penetrationtestingwithraspberrypisecondedition |