Hacking & security: das umfassende Handbuch
Gespeichert in:
Beteiligte Personen: | , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Deutsch |
Veröffentlicht: |
Bonn
Rheinwerk Verlag
2020
|
Ausgabe: | 2., aktualisierte und erweiterte Auflage |
Schriftenreihe: | Rheinwerk computing
|
Schlagwörter: | |
Links: | https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382961 https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382961 https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6382961 https://ebookcentral.proquest.com/lib/augsburg/detail.action?docID=6382961 https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=6382961 |
Beschreibung: | Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548 |
Umfang: | 1 Online-Ressource (1136 Seiten) Illustrationen, Diagramme |
ISBN: | 9783836271936 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046996869 | ||
003 | DE-604 | ||
005 | 20210225 | ||
007 | cr|uuu---uuuuu | ||
008 | 201113s2020 xx a||| o|||| 00||| ger d | ||
020 | |a 9783836271936 |9 978-3-8362-7193-6 | ||
035 | |a (ZDB-30-PQE)6382961 | ||
035 | |a (OCoLC)1220904376 | ||
035 | |a (DE-599)BVBBV046996869 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
049 | |a DE-863 |a DE-862 |a DE-706 |a DE-384 |a DE-91G | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
084 | |a DAT 460 |2 stub | ||
100 | 1 | |a Aigner, Roland |0 (DE-588)1214311385 |4 aut | |
245 | 1 | 0 | |a Hacking & security |b das umfassende Handbuch |c Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
246 | 1 | 3 | |a Hacking and security |
246 | 1 | 3 | |a Hacking und security |
250 | |a 2., aktualisierte und erweiterte Auflage | ||
264 | 1 | |a Bonn |b Rheinwerk Verlag |c 2020 | |
264 | 0 | |c © 2020 | |
300 | |a 1 Online-Ressource (1136 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rheinwerk computing | |
500 | |a Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548 | ||
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Smartphone |0 (DE-588)4845922-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
653 | |a U ; BISAC Subject Heading | ||
653 | |a Hacking | ||
653 | |a Hacker | ||
653 | |a Angriff | ||
653 | |a Cracker | ||
653 | |a NSA | ||
653 | |a Tools | ||
653 | |a Kali Linux | ||
653 | |a Windows | ||
653 | |a Penetration Test | ||
653 | |a Mobile | ||
653 | |a Smartphone | ||
653 | |a Bluetooth | ||
653 | |a WLan | ||
653 | |a Cloud | ||
653 | |a Virtuelle Maschine (VM | ||
653 | |a Active Directory | ||
653 | |a Port Scan | ||
653 | |a Key-Logger | ||
653 | |a Monitoring | ||
653 | |a Rootkits | ||
653 | |a U ; BIC subject category | ||
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 4 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 5 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Smartphone |0 (DE-588)4845922-7 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 5 | |5 DE-604 | |
700 | 1 | |a Gebeshuber, Klaus |0 (DE-588)1161609970 |4 aut | |
700 | 1 | |a Hackner, Thomas |0 (DE-588)1165103818 |4 aut | |
700 | 1 | |a Kania, Stefan |d 1961- |0 (DE-588)1051888980 |4 aut | |
700 | 1 | |a Kloep, Peter |0 (DE-588)1190658445 |4 aut | |
700 | 1 | |a Kofler, Michael |d 1967- |0 (DE-588)121636763 |4 aut | |
700 | 1 | |a Neugebauer, Frank |0 (DE-588)143900641 |4 aut | |
700 | 1 | |a Widl, Markus |0 (DE-588)143202251 |4 aut | |
700 | 1 | |a Zingsheim, André |0 (DE-588)1199122130 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-8362-7191-2 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032404610 | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382961 |l DE-863 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382961 |l DE-862 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6382961 |l DE-91 |p ZDB-30-PQE |q TUM_Einzelkauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/augsburg/detail.action?docID=6382961 |l DE-384 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=6382961 |l DE-706 |p ZDB-30-PQE |q UBY01_Einzelkauf20 |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2533221 |
---|---|
_version_ | 1821933451081678848 |
adam_text | |
any_adam_object | |
author | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André |
author_GND | (DE-588)1214311385 (DE-588)1161609970 (DE-588)1165103818 (DE-588)1051888980 (DE-588)1190658445 (DE-588)121636763 (DE-588)143900641 (DE-588)143202251 (DE-588)1199122130 |
author_facet | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | Aigner, Roland |
author_variant | r a ra k g kg t h th s k sk p k pk m k mk f n fn m w mw a z az |
building | Verbundindex |
bvnumber | BV046996869 |
classification_rvk | ST 277 ST 276 QH 500 |
classification_tum | DAT 460 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)6382961 (OCoLC)1220904376 (DE-599)BVBBV046996869 |
discipline | Informatik Wirtschaftswissenschaften |
edition | 2., aktualisierte und erweiterte Auflage |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV046996869</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210225</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201113s2020 xx a||| o|||| 00||| ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836271936</subfield><subfield code="9">978-3-8362-7193-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)6382961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1220904376</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046996869</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aigner, Roland</subfield><subfield code="0">(DE-588)1214311385</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking & security</subfield><subfield code="b">das umfassende Handbuch</subfield><subfield code="c">Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking and security</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking und security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2., aktualisierte und erweiterte Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk Verlag</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1136 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U ; BISAC Subject Heading</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Angriff</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cracker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NSA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Tools</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kali Linux</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration Test</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smartphone</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bluetooth</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">WLan</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Virtuelle Maschine (VM</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Active Directory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Port Scan</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key-Logger</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Monitoring</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Rootkits</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U ; BIC subject category</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hackner, Thomas</subfield><subfield code="0">(DE-588)1165103818</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kania, Stefan</subfield><subfield code="d">1961-</subfield><subfield code="0">(DE-588)1051888980</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kloep, Peter</subfield><subfield code="0">(DE-588)1190658445</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kofler, Michael</subfield><subfield code="d">1967-</subfield><subfield code="0">(DE-588)121636763</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neugebauer, Frank</subfield><subfield code="0">(DE-588)143900641</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widl, Markus</subfield><subfield code="0">(DE-588)143202251</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zingsheim, André</subfield><subfield code="0">(DE-588)1199122130</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-8362-7191-2</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032404610</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382961</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382961</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6382961</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/augsburg/detail.action?docID=6382961</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/unibwm/detail.action?docID=6382961</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UBY01_Einzelkauf20</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046996869 |
illustrated | Illustrated |
indexdate | 2025-01-11T15:13:55Z |
institution | BVB |
isbn | 9783836271936 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032404610 |
oclc_num | 1220904376 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-706 DE-384 DE-91G DE-BY-TUM |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-706 DE-384 DE-91G DE-BY-TUM |
physical | 1 Online-Ressource (1136 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-30-PQE TUM_Einzelkauf ZDB-30-PQE UBY01_Einzelkauf20 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Rheinwerk Verlag |
record_format | marc |
series2 | Rheinwerk computing |
spellingShingle | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André Hacking & security das umfassende Handbuch Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)7742304-5 (DE-588)4752508-3 (DE-588)4142472-4 (DE-588)4116526-3 (DE-588)4274324-2 (DE-588)1058901281 (DE-588)4011144-1 (DE-588)4845922-7 (DE-588)4113821-1 (DE-588)4825817-9 |
title | Hacking & security das umfassende Handbuch |
title_alt | Hacking and security Hacking und security |
title_auth | Hacking & security das umfassende Handbuch |
title_exact_search | Hacking & security das umfassende Handbuch |
title_full | Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_fullStr | Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_full_unstemmed | Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_short | Hacking & security |
title_sort | hacking security das umfassende handbuch |
title_sub | das umfassende Handbuch |
topic | Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Internet der Dinge Metasploit-Framework Softwareschwachstelle Angriff Softwarewerkzeug Computersicherheit Kali Linux Datensicherung Smartphone Hacker Penetrationstest |
work_keys_str_mv | AT aignerroland hackingsecuritydasumfassendehandbuch AT gebeshuberklaus hackingsecuritydasumfassendehandbuch AT hacknerthomas hackingsecuritydasumfassendehandbuch AT kaniastefan hackingsecuritydasumfassendehandbuch AT kloeppeter hackingsecuritydasumfassendehandbuch AT koflermichael hackingsecuritydasumfassendehandbuch AT neugebauerfrank hackingsecuritydasumfassendehandbuch AT widlmarkus hackingsecuritydasumfassendehandbuch AT zingsheimandre hackingsecuritydasumfassendehandbuch AT aignerroland hackingandsecurity AT gebeshuberklaus hackingandsecurity AT hacknerthomas hackingandsecurity AT kaniastefan hackingandsecurity AT kloeppeter hackingandsecurity AT koflermichael hackingandsecurity AT neugebauerfrank hackingandsecurity AT widlmarkus hackingandsecurity AT zingsheimandre hackingandsecurity AT aignerroland hackingundsecurity AT gebeshuberklaus hackingundsecurity AT hacknerthomas hackingundsecurity AT kaniastefan hackingundsecurity AT kloeppeter hackingundsecurity AT koflermichael hackingundsecurity AT neugebauerfrank hackingundsecurity AT widlmarkus hackingundsecurity AT zingsheimandre hackingundsecurity |