Hacking & security: das umfassende Handbuch
Gespeichert in:
Beteiligte Personen: | , , , , , , , , |
---|---|
Format: | Buch |
Sprache: | Deutsch |
Veröffentlicht: |
Bonn
Rheinwerk Verlag
2021
|
Ausgabe: | 2. akutalisierte und erweiterte Auflage 2020, 1. Nachdruck 2021 |
Schriftenreihe: | Rheinwerk computing
|
Schlagwörter: | |
Beschreibung: | Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548 |
Umfang: | 1134iten Illustrationen, Diagramme |
ISBN: | 9783836271912 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048197175 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 220503s2021 xx a||| |||| 00||| ger d | ||
020 | |a 9783836271912 |9 978-3-8362-7191-2 | ||
035 | |a (DE-599)BVBBV048197175 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
049 | |a DE-Aug7 | ||
082 | 0 | |a 004 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Aigner, Roland |4 aut | |
245 | 1 | 0 | |a Hacking & security |b das umfassende Handbuch |c Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
246 | 1 | 3 | |a Hacking and security |
246 | 1 | 3 | |a Hacking und security |
250 | |a 2. akutalisierte und erweiterte Auflage 2020, 1. Nachdruck 2021 | ||
264 | 1 | |a Bonn |b Rheinwerk Verlag |c 2021 | |
264 | 0 | |c © 2020 | |
300 | |a 1134iten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Rheinwerk computing | |
500 | |a Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548 | ||
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Smartphone |0 (DE-588)4845922-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
653 | |a U ; BISAC Subject Heading | ||
653 | |a Hacking | ||
653 | |a Hacker | ||
653 | |a Angriff | ||
653 | |a Cracker | ||
653 | |a NSA | ||
653 | |a Tools | ||
653 | |a Kali Linux | ||
653 | |a Windows | ||
653 | |a Penetration Test | ||
653 | |a Mobile | ||
653 | |a Smartphone | ||
653 | |a Bluetooth | ||
653 | |a WLan | ||
653 | |a Cloud | ||
653 | |a Virtuelle Maschine (VM | ||
653 | |a Active Directory | ||
653 | |a Port Scan | ||
653 | |a Key-Logger | ||
653 | |a Monitoring | ||
653 | |a Rootkits | ||
653 | |a U ; BIC subject category | ||
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 4 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 5 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Smartphone |0 (DE-588)4845922-7 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
689 | 5 | 0 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 5 | |8 5\p |5 DE-604 | |
700 | 1 | |a Gebeshuber, Klaus |0 (DE-588)1161609970 |4 aut | |
700 | 1 | |a Hackner, Thomas |0 (DE-588)1165103818 |4 aut | |
700 | 1 | |a Kania, Stefan |d 1961- |0 (DE-588)1051888980 |4 aut | |
700 | 1 | |a Kloep, Peter |0 (DE-588)1190658445 |4 aut | |
700 | 1 | |a Kofler, Michael |d 1967- |0 (DE-588)121636763 |4 aut | |
700 | 1 | |a Neugebauer, Frank |0 (DE-588)143900641 |4 aut | |
700 | 1 | |a Widl, Markus |0 (DE-588)143202251 |4 aut | |
700 | 1 | |a Zingsheim, André |0 (DE-588)1199122130 |4 aut | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033578270 |
Datensatz im Suchindex
_version_ | 1820965929948807168 |
---|---|
adam_text | |
any_adam_object | |
author | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André |
author_GND | (DE-588)1161609970 (DE-588)1165103818 (DE-588)1051888980 (DE-588)1190658445 (DE-588)121636763 (DE-588)143900641 (DE-588)143202251 (DE-588)1199122130 |
author_facet | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | Aigner, Roland |
author_variant | r a ra k g kg t h th s k sk p k pk m k mk f n fn m w mw a z az |
building | Verbundindex |
bvnumber | BV048197175 |
classification_rvk | ST 277 ST 276 |
ctrlnum | (DE-599)BVBBV048197175 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. akutalisierte und erweiterte Auflage 2020, 1. Nachdruck 2021 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV048197175</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">220503s2021 xx a||| |||| 00||| ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836271912</subfield><subfield code="9">978-3-8362-7191-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048197175</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug7</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aigner, Roland</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking & security</subfield><subfield code="b">das umfassende Handbuch</subfield><subfield code="c">Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking and security</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hacking und security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. akutalisierte und erweiterte Auflage 2020, 1. Nachdruck 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk Verlag</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1134iten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U ; BISAC Subject Heading</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Angriff</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cracker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NSA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Tools</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Kali Linux</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration Test</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smartphone</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bluetooth</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">WLan</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Virtuelle Maschine (VM</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Active Directory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Port Scan</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Key-Logger</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Monitoring</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Rootkits</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U ; BIC subject category</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hackner, Thomas</subfield><subfield code="0">(DE-588)1165103818</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kania, Stefan</subfield><subfield code="d">1961-</subfield><subfield code="0">(DE-588)1051888980</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kloep, Peter</subfield><subfield code="0">(DE-588)1190658445</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kofler, Michael</subfield><subfield code="d">1967-</subfield><subfield code="0">(DE-588)121636763</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neugebauer, Frank</subfield><subfield code="0">(DE-588)143900641</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widl, Markus</subfield><subfield code="0">(DE-588)143202251</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zingsheim, André</subfield><subfield code="0">(DE-588)1199122130</subfield><subfield code="4">aut</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033578270</subfield></datafield></record></collection> |
id | DE-604.BV048197175 |
illustrated | Illustrated |
indexdate | 2025-01-11T15:13:58Z |
institution | BVB |
isbn | 9783836271912 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033578270 |
open_access_boolean | |
owner | DE-Aug7 |
owner_facet | DE-Aug7 |
physical | 1134iten Illustrationen, Diagramme |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Rheinwerk Verlag |
record_format | marc |
series2 | Rheinwerk computing |
spelling | Aigner, Roland aut Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim Hacking and security Hacking und security 2. akutalisierte und erweiterte Auflage 2020, 1. Nachdruck 2021 Bonn Rheinwerk Verlag 2021 © 2020 1134iten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Rheinwerk computing Auf dem Einband: Schwachstellen verstehen, Angriffsvektoren identifizieren; Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT; Anleitungen für Metasploit, Kali Linux, hydra, OpenVAS, Empire, Pen-Tests, Exploits; Buchnummer 4548 Metasploit-Framework (DE-588)7742304-5 gnd rswk-swf Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Angriff (DE-588)4142472-4 gnd rswk-swf Softwarewerkzeug (DE-588)4116526-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kali Linux (DE-588)1058901281 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Smartphone (DE-588)4845922-7 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf U ; BISAC Subject Heading Hacking Hacker Angriff Cracker NSA Tools Kali Linux Windows Penetration Test Mobile Smartphone Bluetooth WLan Cloud Virtuelle Maschine (VM Active Directory Port Scan Key-Logger Monitoring Rootkits U ; BIC subject category Hacker (DE-588)4113821-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Softwareschwachstelle (DE-588)4752508-3 s Penetrationstest (DE-588)4825817-9 s Softwarewerkzeug (DE-588)4116526-3 s DE-604 Angriff (DE-588)4142472-4 s 1\p DE-604 Smartphone (DE-588)4845922-7 s 2\p DE-604 Internet der Dinge (DE-588)7713781-4 s 3\p DE-604 Metasploit-Framework (DE-588)7742304-5 s 4\p DE-604 Kali Linux (DE-588)1058901281 s 5\p DE-604 Gebeshuber, Klaus (DE-588)1161609970 aut Hackner, Thomas (DE-588)1165103818 aut Kania, Stefan 1961- (DE-588)1051888980 aut Kloep, Peter (DE-588)1190658445 aut Kofler, Michael 1967- (DE-588)121636763 aut Neugebauer, Frank (DE-588)143900641 aut Widl, Markus (DE-588)143202251 aut Zingsheim, André (DE-588)1199122130 aut 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 5\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Aigner, Roland Gebeshuber, Klaus Hackner, Thomas Kania, Stefan 1961- Kloep, Peter Kofler, Michael 1967- Neugebauer, Frank Widl, Markus Zingsheim, André Hacking & security das umfassende Handbuch Metasploit-Framework (DE-588)7742304-5 gnd Internet der Dinge (DE-588)7713781-4 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)7742304-5 (DE-588)7713781-4 (DE-588)4752508-3 (DE-588)4142472-4 (DE-588)4116526-3 (DE-588)4274324-2 (DE-588)1058901281 (DE-588)4011144-1 (DE-588)4845922-7 (DE-588)4113821-1 (DE-588)4825817-9 |
title | Hacking & security das umfassende Handbuch |
title_alt | Hacking and security Hacking und security |
title_auth | Hacking & security das umfassende Handbuch |
title_exact_search | Hacking & security das umfassende Handbuch |
title_full | Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_fullStr | Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_full_unstemmed | Hacking & security das umfassende Handbuch Aigner, Gebeshuber, Hackner, Kania, Kloep, Kofler, Neugebauer, Widl, Zingsheim |
title_short | Hacking & security |
title_sort | hacking security das umfassende handbuch |
title_sub | das umfassende Handbuch |
topic | Metasploit-Framework (DE-588)7742304-5 gnd Internet der Dinge (DE-588)7713781-4 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Metasploit-Framework Internet der Dinge Softwareschwachstelle Angriff Softwarewerkzeug Computersicherheit Kali Linux Datensicherung Smartphone Hacker Penetrationstest |
work_keys_str_mv | AT aignerroland hackingsecuritydasumfassendehandbuch AT gebeshuberklaus hackingsecuritydasumfassendehandbuch AT hacknerthomas hackingsecuritydasumfassendehandbuch AT kaniastefan hackingsecuritydasumfassendehandbuch AT kloeppeter hackingsecuritydasumfassendehandbuch AT koflermichael hackingsecuritydasumfassendehandbuch AT neugebauerfrank hackingsecuritydasumfassendehandbuch AT widlmarkus hackingsecuritydasumfassendehandbuch AT zingsheimandre hackingsecuritydasumfassendehandbuch AT aignerroland hackingandsecurity AT gebeshuberklaus hackingandsecurity AT hacknerthomas hackingandsecurity AT kaniastefan hackingandsecurity AT kloeppeter hackingandsecurity AT koflermichael hackingandsecurity AT neugebauerfrank hackingandsecurity AT widlmarkus hackingandsecurity AT zingsheimandre hackingandsecurity AT aignerroland hackingundsecurity AT gebeshuberklaus hackingundsecurity AT hacknerthomas hackingundsecurity AT kaniastefan hackingundsecurity AT kloeppeter hackingundsecurity AT koflermichael hackingundsecurity AT neugebauerfrank hackingundsecurity AT widlmarkus hackingundsecurity AT zingsheimandre hackingundsecurity |