Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Waltham, MA
Syngress
[2016]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780128042823/?ar |
Item Description: | Includes bibliographical references. - Online resource; title from title page (Safari, viewed December 14, 2015) |
Physical Description: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9780128042823 0128042826 0128042788 9780128042786 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047408049 | ||
003 | DE-627-1 | ||
005 | 20240228120017.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2016 xx |||||o 00| ||eng c | ||
020 | |a 9780128042823 |9 978-0-12-804282-3 | ||
020 | |a 0128042826 |9 0-12-804282-6 | ||
020 | |a 0128042788 |9 0-12-804278-8 | ||
020 | |a 9780128042786 |9 978-0-12-804278-6 | ||
035 | |a (DE-627-1)047408049 | ||
035 | |a (DE-599)KEP047408049 | ||
035 | |a (ORHE)9780128042823 | ||
035 | |a (DE-627-1)047408049 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 364.16/8 |2 23/eng/20230216 | |
100 | 1 | |a Street, Jayson E. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Dissecting the hack |b the V3rb0ten network |c Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin |
246 | 3 | 3 | |a V3rb0ten network |
264 | 1 | |a Waltham, MA |b Syngress |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed December 14, 2015) | ||
650 | 0 | |a Computer crimes | |
650 | 0 | |a Hacking | |
650 | 0 | |a Hackers | |
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Cyberterrorisme | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Hackers | |
650 | 4 | |a Hacking | |
700 | 1 | |a Sims, Kristin |e VerfasserIn |4 aut | |
700 | 1 | |a Baskin, Brian |e VerfasserIn |4 aut | |
700 | 1 | |a Martin, Brian |e HerausgeberIn |4 edt | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128042823/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047408049 |
---|---|
_version_ | 1835903222215081984 |
adam_text | |
any_adam_object | |
author | Street, Jayson E. Sims, Kristin Baskin, Brian |
author2 | Martin, Brian |
author2_role | edt |
author2_variant | b m bm |
author_facet | Street, Jayson E. Sims, Kristin Baskin, Brian Martin, Brian |
author_role | aut aut aut |
author_sort | Street, Jayson E. |
author_variant | j e s je jes k s ks b b bb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047408049 (DE-599)KEP047408049 (ORHE)9780128042823 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02242cam a22006492c 4500</leader><controlfield tag="001">ZDB-30-ORH-047408049</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120017.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128042823</subfield><subfield code="9">978-0-12-804282-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128042826</subfield><subfield code="9">0-12-804282-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128042788</subfield><subfield code="9">0-12-804278-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128042786</subfield><subfield code="9">978-0-12-804278-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047408049</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047408049</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128042823</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047408049</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Street, Jayson E.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dissecting the hack</subfield><subfield code="b">the V3rb0ten network</subfield><subfield code="c">Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">V3rb0ten network</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed December 14, 2015)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sims, Kristin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baskin, Brian</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Brian</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128042823/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047408049 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:50Z |
institution | BVB |
isbn | 9780128042823 0128042826 0128042788 9780128042786 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Syngress |
record_format | marc |
spelling | Street, Jayson E. VerfasserIn aut Dissecting the hack the V3rb0ten network Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin V3rb0ten network Waltham, MA Syngress [2016] ©2016 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from title page (Safari, viewed December 14, 2015) Computer crimes Hacking Hackers Cyberterrorism Computer networks Security measures Computer security Computer Security Criminalité informatique Piratage informatique Pirates informatiques Cyberterrorisme Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Sims, Kristin VerfasserIn aut Baskin, Brian VerfasserIn aut Martin, Brian HerausgeberIn edt |
spellingShingle | Street, Jayson E. Sims, Kristin Baskin, Brian Dissecting the hack the V3rb0ten network Computer crimes Hacking Hackers Cyberterrorism Computer networks Security measures Computer security Computer Security Criminalité informatique Piratage informatique Pirates informatiques Cyberterrorisme Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
title | Dissecting the hack the V3rb0ten network |
title_alt | V3rb0ten network |
title_auth | Dissecting the hack the V3rb0ten network |
title_exact_search | Dissecting the hack the V3rb0ten network |
title_full | Dissecting the hack the V3rb0ten network Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin |
title_fullStr | Dissecting the hack the V3rb0ten network Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin |
title_full_unstemmed | Dissecting the hack the V3rb0ten network Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin |
title_short | Dissecting the hack |
title_sort | dissecting the hack the v3rb0ten network |
title_sub | the V3rb0ten network |
topic | Computer crimes Hacking Hackers Cyberterrorism Computer networks Security measures Computer security Computer Security Criminalité informatique Piratage informatique Pirates informatiques Cyberterrorisme Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
topic_facet | Computer crimes Hacking Hackers Cyberterrorism Computer networks Security measures Computer security Computer Security Criminalité informatique Piratage informatique Pirates informatiques Cyberterrorisme Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
work_keys_str_mv | AT streetjaysone dissectingthehackthev3rb0tennetwork AT simskristin dissectingthehackthev3rb0tennetwork AT baskinbrian dissectingthehackthev3rb0tennetwork AT martinbrian dissectingthehackthev3rb0tennetwork AT streetjaysone v3rb0tennetwork AT simskristin v3rb0tennetwork AT baskinbrian v3rb0tennetwork AT martinbrian v3rb0tennetwork |