Hacking for dummies:
"This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, NJ
Wiley Pub.
2010
|
Edition: | 3rd ed. |
Series: | --For dummies
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780470550939/?ar |
Summary: | "This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking"--Resource description page |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (xviii, 386 Seiten) illustrations. |
ISBN: | 9780470602560 0470602562 9780470602683 0470602686 1282471899 9781282471894 9786612471896 6612471891 9780470550939 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04748537X | ||
003 | DE-627-1 | ||
005 | 20240228114523.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2010 xx |||||o 00| ||eng c | ||
020 | |a 9780470602560 |c electronic bk. |9 978-0-470-60256-0 | ||
020 | |a 0470602562 |c electronic bk. |9 0-470-60256-2 | ||
020 | |a 9780470602683 |c electronic bk. |9 978-0-470-60268-3 | ||
020 | |a 0470602686 |c electronic bk. |9 0-470-60268-6 | ||
020 | |a 1282471899 |9 1-282-47189-9 | ||
020 | |a 9781282471894 |9 978-1-282-47189-4 | ||
020 | |a 9786612471896 |9 9786612471896 | ||
020 | |a 6612471891 |9 6612471891 | ||
020 | |a 9780470550939 |9 978-0-470-55093-9 | ||
035 | |a (DE-627-1)04748537X | ||
035 | |a (DE-599)KEP04748537X | ||
035 | |a (ORHE)9780470550939 | ||
035 | |a (DE-627-1)04748537X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Beaver, Kevin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking for dummies |c by Kevin Beaver ; foreword by Stuart McClure |
250 | |a 3rd ed. | ||
264 | 1 | |a Hoboken, NJ |b Wiley Pub. |c 2010 | |
300 | |a 1 Online-Ressource (xviii, 386 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a --For dummies | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking"--Resource description page | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hackers | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
776 | 1 | |z 9780470550939 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780470550939 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780470550939/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-04748537X |
---|---|
_version_ | 1829007803353661440 |
adam_text | |
any_adam_object | |
author | Beaver, Kevin |
author_facet | Beaver, Kevin |
author_role | aut |
author_sort | Beaver, Kevin |
author_variant | k b kb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04748537X (DE-599)KEP04748537X (ORHE)9780470550939 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3rd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03067cam a22006852c 4500</leader><controlfield tag="001">ZDB-30-ORH-04748537X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114523.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470602560</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-60256-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470602562</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-60256-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470602683</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-60268-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470602686</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-60268-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282471899</subfield><subfield code="9">1-282-47189-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282471894</subfield><subfield code="9">978-1-282-47189-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612471896</subfield><subfield code="9">9786612471896</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6612471891</subfield><subfield code="9">6612471891</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470550939</subfield><subfield code="9">978-0-470-55093-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04748537X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04748537X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780470550939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04748537X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beaver, Kevin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking for dummies</subfield><subfield code="c">by Kevin Beaver ; foreword by Stuart McClure</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 386 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">--For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking"--Resource description page</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780470550939</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780470550939</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780470550939/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04748537X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:06Z |
institution | BVB |
isbn | 9780470602560 0470602562 9780470602683 0470602686 1282471899 9781282471894 9786612471896 6612471891 9780470550939 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xviii, 386 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley Pub. |
record_format | marc |
series2 | --For dummies |
spelling | Beaver, Kevin VerfasserIn aut Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure 3rd ed. Hoboken, NJ Wiley Pub. 2010 1 Online-Ressource (xviii, 386 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier --For dummies Includes bibliographical references and index. - Print version record "This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking"--Resource description page English. Computer security Computer networks Security measures Hackers Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures 9780470550939 Erscheint auch als Druck-Ausgabe 9780470550939 |
spellingShingle | Beaver, Kevin Hacking for dummies Computer security Computer networks Security measures Hackers Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Hacking for dummies |
title_auth | Hacking for dummies |
title_exact_search | Hacking for dummies |
title_full | Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure |
title_fullStr | Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure |
title_full_unstemmed | Hacking for dummies by Kevin Beaver ; foreword by Stuart McClure |
title_short | Hacking for dummies |
title_sort | hacking for dummies |
topic | Computer security Computer networks Security measures Hackers Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Hackers Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT beaverkevin hackingfordummies |