Hacking for dummies:
Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, N.J.
Wiley Pub.
2007
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | --For dummies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780470052358/?ar |
Zusammenfassung: | Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (1 volume). |
ISBN: | 0470113073 9780470113073 9780470052358 047005235X |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047475552 | ||
003 | DE-627-1 | ||
005 | 20240228114044.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 0470113073 |c electronic bk. |9 0-470-11307-3 | ||
020 | |a 9780470113073 |c electronic bk. |9 978-0-470-11307-3 | ||
020 | |a 9780470052358 |9 978-0-470-05235-8 | ||
020 | |a 047005235X |9 0-470-05235-X | ||
035 | |a (DE-627-1)047475552 | ||
035 | |a (DE-599)KEP047475552 | ||
035 | |a (ORHE)9780470052358 | ||
035 | |a (DE-627-1)047475552 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Beaver, Kevin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking for dummies |c by Kevin Beaver ; foreword by Stuart McClure |
250 | |a 2nd ed. | ||
264 | 1 | |a Hoboken, N.J. |b Wiley Pub. |c 2007 | |
300 | |a 1 Online-Ressource (1 volume). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a --For dummies | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hackers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Engineering & Applied Sciences | |
650 | 4 | |a Computer Science | |
776 | 1 | |z 047005235X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 047005235X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780470052358/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047475552 |
---|---|
_version_ | 1829007805249486848 |
adam_text | |
any_adam_object | |
author | Beaver, Kevin |
author_facet | Beaver, Kevin |
author_role | aut |
author_sort | Beaver, Kevin |
author_variant | k b kb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047475552 (DE-599)KEP047475552 (ORHE)9780470052358 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02815cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-047475552</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114044.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470113073</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-11307-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470113073</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-11307-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470052358</subfield><subfield code="9">978-0-470-05235-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">047005235X</subfield><subfield code="9">0-470-05235-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047475552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047475552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780470052358</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047475552</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beaver, Kevin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking for dummies</subfield><subfield code="c">by Kevin Beaver ; foreword by Stuart McClure</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">--For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering & Applied Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">047005235X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">047005235X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780470052358/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047475552 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:08Z |
institution | BVB |
isbn | 0470113073 9780470113073 9780470052358 047005235X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley Pub. |
record_format | marc |
series2 | --For dummies |
spelling | Beaver, Kevin VerfasserIn aut Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure 2nd ed. Hoboken, N.J. Wiley Pub. 2007 1 Online-Ressource (1 volume). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier --For dummies Includes bibliographical references and index. - Print version record Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili. Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer hackers Engineering & Applied Sciences Computer Science 047005235X Erscheint auch als Druck-Ausgabe 047005235X |
spellingShingle | Beaver, Kevin Hacking for dummies Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer hackers Engineering & Applied Sciences Computer Science |
title | Hacking for dummies |
title_auth | Hacking for dummies |
title_exact_search | Hacking for dummies |
title_full | Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure |
title_fullStr | Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure |
title_full_unstemmed | Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure |
title_short | Hacking for dummies |
title_sort | hacking for dummies |
topic | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer hackers Engineering & Applied Sciences Computer Science |
topic_facet | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Computer hackers Engineering & Applied Sciences Computer Science |
work_keys_str_mv | AT beaverkevin hackingfordummies |