Hacking for dummies:
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Inc.
2013
|
Ausgabe: | 4th edition. |
Schriftenreihe: | --For dummies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781118380956/?ar |
Zusammenfassung: | Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xvi, 390 Seiten) illustrations |
ISBN: | 9781118380963 1118380967 9781118380949 1118380940 9781118380956 1118380959 1283941120 9781283941129 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047532882 | ||
003 | DE-627-1 | ||
005 | 20240228115221.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781118380963 |c e-book |9 978-1-118-38096-3 | ||
020 | |a 1118380967 |c e-book |9 1-118-38096-7 | ||
020 | |a 9781118380949 |c ebk |9 978-1-118-38094-9 | ||
020 | |a 1118380940 |c ebk |9 1-118-38094-0 | ||
020 | |a 9781118380956 |c ebk |9 978-1-118-38095-6 | ||
020 | |a 1118380959 |c ebk |9 1-118-38095-9 | ||
020 | |a 1283941120 |9 1-283-94112-0 | ||
020 | |a 9781283941129 |9 978-1-283-94112-9 | ||
035 | |a (DE-627-1)047532882 | ||
035 | |a (DE-599)KEP047532882 | ||
035 | |a (ORHE)9781118380956 | ||
035 | |a (DE-627-1)047532882 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Beaver, Kevin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking for dummies |c by Kevin Beaver |
250 | |a 4th edition. | ||
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc. |c 2013 | |
300 | |a 1 Online-Ressource (xvi, 390 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a --For dummies | |
500 | |a Includes bibliographical references and index | ||
520 | |a Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hackers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
776 | 1 | |z 9781118380932 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781118380932 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118380956/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047532882 |
---|---|
_version_ | 1829007794902138881 |
adam_text | |
any_adam_object | |
author | Beaver, Kevin |
author_facet | Beaver, Kevin |
author_role | aut |
author_sort | Beaver, Kevin |
author_variant | k b kb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047532882 (DE-599)KEP047532882 (ORHE)9781118380956 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 4th edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02419cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-047532882</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115221.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118380963</subfield><subfield code="c">e-book</subfield><subfield code="9">978-1-118-38096-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118380967</subfield><subfield code="c">e-book</subfield><subfield code="9">1-118-38096-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118380949</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-118-38094-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118380940</subfield><subfield code="c">ebk</subfield><subfield code="9">1-118-38094-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118380956</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-118-38095-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118380959</subfield><subfield code="c">ebk</subfield><subfield code="9">1-118-38095-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283941120</subfield><subfield code="9">1-283-94112-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283941129</subfield><subfield code="9">978-1-283-94112-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047532882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047532882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118380956</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047532882</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beaver, Kevin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking for dummies</subfield><subfield code="c">by Kevin Beaver</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4th edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 390 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">--For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781118380932</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781118380932</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118380956/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047532882 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:58Z |
institution | BVB |
isbn | 9781118380963 1118380967 9781118380949 1118380940 9781118380956 1118380959 1283941120 9781283941129 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 390 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
series2 | --For dummies |
spelling | Beaver, Kevin VerfasserIn aut Hacking for dummies by Kevin Beaver 4th edition. Hoboken, NJ John Wiley & Sons, Inc. 2013 1 Online-Ressource (xvi, 390 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier --For dummies Includes bibliographical references and index Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! English. Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures 9781118380932 Erscheint auch als Druck-Ausgabe 9781118380932 |
spellingShingle | Beaver, Kevin Hacking for dummies Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Hacking for dummies |
title_auth | Hacking for dummies |
title_exact_search | Hacking for dummies |
title_full | Hacking for dummies by Kevin Beaver |
title_fullStr | Hacking for dummies by Kevin Beaver |
title_full_unstemmed | Hacking for dummies by Kevin Beaver |
title_short | Hacking for dummies |
title_sort | hacking for dummies |
topic | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT beaverkevin hackingfordummies |