Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN
Wiley Pub.
2005
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780470503829/?ar |
Summary: | Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (xvii, 270 pages) illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
ISBN: | 0764589423 9780764589423 9780470503829 0470503823 9780471469940 0471469947 9780764569593 0764569597 9786610252572 6610252572 9781280252570 128025257X |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047483725 | ||
003 | DE-627-1 | ||
005 | 20240228113927.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2005 xx |||||o 00| ||eng c | ||
020 | |a 0764589423 |c electronic bk. |9 0-7645-8942-3 | ||
020 | |a 9780764589423 |c electronic bk. |9 978-0-7645-8942-3 | ||
020 | |a 9780470503829 |c electronic bk. ; |9 978-0-470-50382-9 | ||
020 | |a 0470503823 |c electronic bk. ; |9 0-470-50382-3 | ||
020 | |a 9780471469940 |c electronic bk. ; |9 978-0-471-46994-0 | ||
020 | |a 0471469947 |c electronic bk. ; |9 0-471-46994-7 | ||
020 | |a 9780764569593 |9 978-0-7645-6959-3 | ||
020 | |a 0764569597 |9 0-7645-6959-7 | ||
020 | |a 9786610252572 |9 9786610252572 | ||
020 | |a 6610252572 |9 6610252572 | ||
020 | |a 9781280252570 |c online |9 978-1-280-25257-0 | ||
020 | |a 128025257X |9 1-280-25257-X | ||
035 | |a (DE-627-1)047483725 | ||
035 | |a (DE-599)KEP047483725 | ||
035 | |a (ORHE)9780470503829 | ||
035 | |a (DE-627-1)047483725 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 277 |2 rvk | ||
100 | 1 | |a Mitnick, Kevin |d 1963-2023. |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The art of intrusion |b the real stories behind the exploits of hackers, intruders & deceivers |c Kevin D. Mitnick, William L. Simon |
264 | 1 | |a Indianapolis, IN |b Wiley Pub. |c 2005 | |
264 | 2 | |a [Place of publication not identified] |b HathiTrust Digital Library | |
300 | |a 1 Online-Ressource (xvii, 270 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
506 | |f Restrictions unspecified |2 star | ||
520 | |a Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Hackers | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Technologie de l'information ; Aspect social | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computerkriminalität | |
650 | 4 | |a Computersicherheit | |
650 | 4 | |a Hacking | |
650 | 4 | |a Hacker | |
700 | 1 | |a Simon, William L. |d 1930- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0764569597 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0764569597 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780470503829/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
936 | r | v | |a ST 277 |
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047483725 |
---|---|
_version_ | 1835903209348005889 |
adam_text | |
any_adam_object | |
author | Mitnick, Kevin 1963-2023 |
author2 | Simon, William L. 1930- |
author2_role | ctb |
author2_variant | w l s wl wls |
author_facet | Mitnick, Kevin 1963-2023 Simon, William L. 1930- |
author_role | aut |
author_sort | Mitnick, Kevin 1963-2023 |
author_variant | k m km |
building | Verbundindex |
bvnumber | localTUM |
classification_rvk | ST 277 |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047483725 (DE-599)KEP047483725 (ORHE)9780470503829 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03295cam a22007932c 4500</leader><controlfield tag="001">ZDB-30-ORH-047483725</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113927.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0764589423</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7645-8942-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780764589423</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7645-8942-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470503829</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">978-0-470-50382-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470503823</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">0-470-50382-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471469940</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">978-0-471-46994-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471469947</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">0-471-46994-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780764569593</subfield><subfield code="9">978-0-7645-6959-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0764569597</subfield><subfield code="9">0-7645-6959-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786610252572</subfield><subfield code="9">9786610252572</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6610252572</subfield><subfield code="9">6610252572</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280252570</subfield><subfield code="c">online</subfield><subfield code="9">978-1-280-25257-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">128025257X</subfield><subfield code="9">1-280-25257-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047483725</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047483725</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780470503829</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047483725</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mitnick, Kevin</subfield><subfield code="d">1963-2023.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The art of intrusion</subfield><subfield code="b">the real stories behind the exploits of hackers, intruders & deceivers</subfield><subfield code="c">Kevin D. Mitnick, William L. Simon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2005</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">HathiTrust Digital Library</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 270 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Aspect social</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computerkriminalität</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacker</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Simon, William L.</subfield><subfield code="d">1930-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0764569597</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0764569597</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780470503829/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 277</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047483725 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:38Z |
institution | BVB |
isbn | 0764589423 9780764589423 9780470503829 0470503823 9780471469940 0471469947 9780764569593 0764569597 9786610252572 6610252572 9781280252570 128025257X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvii, 270 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Wiley Pub. |
record_format | marc |
spelling | Mitnick, Kevin 1963-2023. VerfasserIn aut The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers Kevin D. Mitnick, William L. Simon Indianapolis, IN Wiley Pub. 2005 [Place of publication not identified] HathiTrust Digital Library 1 Online-Ressource (xvii, 270 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Restrictions unspecified star Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. English. Computer security Hackers Computer Security Sécurité informatique Technologie de l'information ; Aspect social Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computerkriminalität Computersicherheit Hacking Hacker Simon, William L. 1930- MitwirkendeR ctb 0764569597 Erscheint auch als Druck-Ausgabe 0764569597 |
spellingShingle | Mitnick, Kevin 1963-2023 The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers Computer security Hackers Computer Security Sécurité informatique Technologie de l'information ; Aspect social Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computerkriminalität Computersicherheit Hacking Hacker |
title | The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers |
title_auth | The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers |
title_exact_search | The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers |
title_full | The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers Kevin D. Mitnick, William L. Simon |
title_fullStr | The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers Kevin D. Mitnick, William L. Simon |
title_full_unstemmed | The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers Kevin D. Mitnick, William L. Simon |
title_short | The art of intrusion |
title_sort | art of intrusion the real stories behind the exploits of hackers intruders deceivers |
title_sub | the real stories behind the exploits of hackers, intruders & deceivers |
topic | Computer security Hackers Computer Security Sécurité informatique Technologie de l'information ; Aspect social Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computerkriminalität Computersicherheit Hacking Hacker |
topic_facet | Computer security Hackers Computer Security Sécurité informatique Technologie de l'information ; Aspect social Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computerkriminalität Computersicherheit Hacking Hacker |
work_keys_str_mv | AT mitnickkevin theartofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers AT simonwilliaml theartofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers AT mitnickkevin artofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers AT simonwilliaml artofintrusiontherealstoriesbehindtheexploitsofhackersintrudersdeceivers |