Digital forensics with Kali Linux :: perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x /
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Previous edition published: 2017. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781838644109 1838644105 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1196206357 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 200918s2020 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d YDX |d N$T |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
019 | |a 1151816663 | ||
020 | |a 9781838644109 | ||
020 | |a 1838644105 | ||
020 | |z 9781838640804 | ||
035 | |a (OCoLC)1196206357 |z (OCoLC)1151816663 | ||
037 | |a CL0501000142 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Parasram, Shiva V. N., |e author. | |
245 | 1 | 0 | |a Digital forensics with Kali Linux : |b perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / |c Shiva V.N. Parasram. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2020. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from cover (Safari, viewed September 16, 2020). | |
500 | |a Previous edition published: 2017. | ||
504 | |a Includes bibliographical references. | ||
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Computer crimes |x Investigation. |0 http://id.loc.gov/authorities/subjects/sh85029493 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Malware (Computer software) |0 http://id.loc.gov/authorities/subjects/sh2009005103 | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Logiciels malveillants. | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Malware (Computer software) |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2449068 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 2449068 | ||
938 | |a YBP Library Services |b YANK |n 301234188 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1196206357 |
---|---|
_version_ | 1816882529051869184 |
adam_text | |
any_adam_object | |
author | Parasram, Shiva V. N. |
author_facet | Parasram, Shiva V. N. |
author_role | aut |
author_sort | Parasram, Shiva V. N. |
author_variant | s v n p svn svnp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1196206357 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02424cam a2200553 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1196206357</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">200918s2020 enka ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1151816663</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838644109</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838644105</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838640804</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1196206357</subfield><subfield code="z">(OCoLC)1151816663</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0501000142</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parasram, Shiva V. N.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics with Kali Linux :</subfield><subfield code="b">perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x /</subfield><subfield code="c">Shiva V.N. Parasram.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed September 16, 2020).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2017.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029493</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2009005103</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels malveillants.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2449068</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2449068</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301234188</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1196206357 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:30:03Z |
institution | BVB |
isbn | 9781838644109 1838644105 |
language | English |
oclc_num | 1196206357 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Parasram, Shiva V. N., author. Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / Shiva V.N. Parasram. Birmingham, UK : Packt Publishing, 2020. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from cover (Safari, viewed September 16, 2020). Previous edition published: 2017. Includes bibliographical references. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Logiciels malveillants. Computer crimes Investigation fast Computer networks Security measures fast Malware (Computer software) fast Penetration testing (Computer security) fast FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2449068 Volltext |
spellingShingle | Parasram, Shiva V. N. Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Logiciels malveillants. Computer crimes Investigation fast Computer networks Security measures fast Malware (Computer software) fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 http://id.loc.gov/authorities/subjects/sh85029493 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh2009005103 |
title | Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / |
title_auth | Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / |
title_exact_search | Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / |
title_full | Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / Shiva V.N. Parasram. |
title_fullStr | Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / Shiva V.N. Parasram. |
title_full_unstemmed | Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / Shiva V.N. Parasram. |
title_short | Digital forensics with Kali Linux : |
title_sort | digital forensics with kali linux perform data acquisition data recover network forensics and malware analysis with kali linux 2019x |
title_sub | perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x / |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Logiciels malveillants. Computer crimes Investigation fast Computer networks Security measures fast Malware (Computer software) fast Penetration testing (Computer security) fast |
topic_facet | Kali Linux. Kali Linux Computer crimes Investigation. Computer networks Security measures. Penetration testing (Computer security) Malware (Computer software) Criminalité informatique Enquêtes. Réseaux d'ordinateurs Sécurité Mesures. Tests d'intrusion. Logiciels malveillants. Computer crimes Investigation Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2449068 |
work_keys_str_mv | AT parasramshivavn digitalforensicswithkalilinuxperformdataacquisitiondatarecovernetworkforensicsandmalwareanalysiswithkalilinux2019x |