Perspectives on ethical hacking and penetration testing:
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges,...
Saved in:
Other Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Hershey, PA
IGI Global
[2023]
|
Series: | Advances in computational intelligence and robotics (ACIR) book series
Premier reference source |
Subjects: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Summary: | Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. |
Item Description: | Includes bibliographical references and index |
Physical Description: | xx, 445 Seiten Illustrationen |
ISBN: | 9781668482186 9781668482193 |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049505331 | ||
003 | DE-604 | ||
005 | 20240325 | ||
007 | t| | ||
008 | 240117s2023 xx a||| |||| 00||| eng d | ||
010 | |a 2022062311 | ||
020 | |a 9781668482186 |c h/c |9 978-1-66848-218-6 | ||
020 | |a 9781668482193 |c s/c |9 978-1-66848-219-3 | ||
024 | 3 | |a 9781668482186 | |
035 | |a (ELiSA)ELiSA-9781668482186 | ||
035 | |a (OCoLC)1429559846 | ||
035 | |a (DE-599)KXP1847512135 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Perspectives on ethical hacking and penetration testing |c Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
264 | 1 | |a Hershey, PA |b IGI Global |c [2023] | |
300 | |a xx, 445 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advances in computational intelligence and robotics (ACIR) book series | |
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | |a Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. | ||
650 | 7 | |a Penetration testing (Computer security) |2 DLC | |
650 | 7 | |a Computer crimes |x Prevention |2 DLC | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |2 gnd |9 rswk-swf |
653 | |a Computerkriminalität & Hacking | ||
653 | |a Bioethik, Tierethik | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kaushik, Keshav |0 (DE-588)1310505136 |4 edt | |
700 | 1 | |a Bhardwaj, Akashdeep |d 1971- |0 (DE-588)1284516636 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Perspectives on ethical hacking and penetration testing |d Hershey, Pennsylvania : IGI Global, publishers of timely knowledge, 2023 |h 1 Online-Ressource (xx, 445 Seiten) |z 9781668482209 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034850398 |
Record in the Search Index
_version_ | 1818991672865849344 |
---|---|
any_adam_object | 1 |
author2 | Kaushik, Keshav Bhardwaj, Akashdeep 1971- |
author2_role | edt edt |
author2_variant | k k kk a b ab |
author_GND | (DE-588)1310505136 (DE-588)1284516636 |
author_facet | Kaushik, Keshav Bhardwaj, Akashdeep 1971- |
building | Verbundindex |
bvnumber | BV049505331 |
classification_rvk | ST 277 |
ctrlnum | (ELiSA)ELiSA-9781668482186 (OCoLC)1429559846 (DE-599)KXP1847512135 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03693nam a2200505 c 4500</leader><controlfield tag="001">BV049505331</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240325 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">240117s2023 xx a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2022062311</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668482186</subfield><subfield code="c">h/c</subfield><subfield code="9">978-1-66848-218-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668482193</subfield><subfield code="c">s/c</subfield><subfield code="9">978-1-66848-219-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781668482186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELiSA)ELiSA-9781668482186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429559846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1847512135</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Perspectives on ethical hacking and penetration testing</subfield><subfield code="c">Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 445 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in computational intelligence and robotics (ACIR) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">DLC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">DLC</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computerkriminalität & Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bioethik, Tierethik</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaushik, Keshav</subfield><subfield code="0">(DE-588)1310505136</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhardwaj, Akashdeep</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)1284516636</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Perspectives on ethical hacking and penetration testing</subfield><subfield code="d">Hershey, Pennsylvania : IGI Global, publishers of timely knowledge, 2023</subfield><subfield code="h">1 Online-Ressource (xx, 445 Seiten)</subfield><subfield code="z">9781668482209</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034850398</subfield></datafield></record></collection> |
id | DE-604.BV049505331 |
illustrated | Illustrated |
indexdate | 2024-12-20T20:14:00Z |
institution | BVB |
isbn | 9781668482186 9781668482193 |
language | English |
lccn | 2022062311 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034850398 |
oclc_num | 1429559846 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xx, 445 Seiten Illustrationen |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in computational intelligence and robotics (ACIR) book series Premier reference source |
spelling | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India Hershey, PA IGI Global [2023] xx, 445 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Advances in computational intelligence and robotics (ACIR) book series Premier reference source Includes bibliographical references and index Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. Penetration testing (Computer security) DLC Computer crimes Prevention DLC Computersicherheit (DE-588)4274324-2 gnd rswk-swf Social Engineering Sicherheit (DE-588)7539699-3 gnd rswk-swf Computerkriminalität & Hacking Bioethik, Tierethik Computersicherheit (DE-588)4274324-2 s Social Engineering Sicherheit (DE-588)7539699-3 s DE-604 Kaushik, Keshav (DE-588)1310505136 edt Bhardwaj, Akashdeep 1971- (DE-588)1284516636 edt Erscheint auch als Online-Ausgabe Perspectives on ethical hacking and penetration testing Hershey, Pennsylvania : IGI Global, publishers of timely knowledge, 2023 1 Online-Ressource (xx, 445 Seiten) 9781668482209 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Perspectives on ethical hacking and penetration testing Penetration testing (Computer security) DLC Computer crimes Prevention DLC Computersicherheit (DE-588)4274324-2 gnd Social Engineering Sicherheit (DE-588)7539699-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7539699-3 |
title | Perspectives on ethical hacking and penetration testing |
title_auth | Perspectives on ethical hacking and penetration testing |
title_exact_search | Perspectives on ethical hacking and penetration testing |
title_full | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
title_fullStr | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
title_full_unstemmed | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
title_short | Perspectives on ethical hacking and penetration testing |
title_sort | perspectives on ethical hacking and penetration testing |
topic | Penetration testing (Computer security) DLC Computer crimes Prevention DLC Computersicherheit (DE-588)4274324-2 gnd Social Engineering Sicherheit (DE-588)7539699-3 gnd |
topic_facet | Penetration testing (Computer security) Computer crimes Prevention Computersicherheit Social Engineering Sicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kaushikkeshav perspectivesonethicalhackingandpenetrationtesting AT bhardwajakashdeep perspectivesonethicalhackingandpenetrationtesting |