Hacking for dummies:
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Inc.
[2016]
|
Ausgabe: | 5th edition. |
Schriftenreihe: | --For dummies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119154686/?ar |
Zusammenfassung: | Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xvi, 390 Seiten) illustrations. |
ISBN: | 9781119154693 1119154693 9781119154686 1119154685 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04755200X | ||
003 | DE-627-1 | ||
005 | 20240228120018.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2016 xx |||||o 00| ||eng c | ||
020 | |a 9781119154693 |c electronic bk. |9 978-1-119-15469-3 | ||
020 | |a 1119154693 |c electronic bk. |9 1-119-15469-3 | ||
020 | |a 9781119154686 |9 978-1-119-15468-6 | ||
020 | |a 1119154685 |9 1-119-15468-5 | ||
035 | |a (DE-627-1)04755200X | ||
035 | |a (DE-599)KEP04755200X | ||
035 | |a (ORHE)9781119154686 | ||
035 | |a (DE-627-1)04755200X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Beaver, Kevin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking for dummies |c by Kevin Beaver |
250 | |a 5th edition. | ||
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc. |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 Online-Ressource (xvi, 390 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a --For dummies | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hackers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
776 | 1 | |z 9781119154686 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119154686 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119154686/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04755200X |
---|---|
_version_ | 1829007791432400897 |
adam_text | |
any_adam_object | |
author | Beaver, Kevin |
author_facet | Beaver, Kevin |
author_role | aut |
author_sort | Beaver, Kevin |
author_variant | k b kb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04755200X (DE-599)KEP04755200X (ORHE)9781119154686 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 5th edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02258cam a22006132c 4500</leader><controlfield tag="001">ZDB-30-ORH-04755200X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120018.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119154693</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-15469-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119154693</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-15469-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119154686</subfield><subfield code="9">978-1-119-15468-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119154685</subfield><subfield code="9">1-119-15468-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04755200X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04755200X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119154686</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04755200X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beaver, Kevin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking for dummies</subfield><subfield code="c">by Kevin Beaver</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">5th edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 390 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">--For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119154686</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119154686</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119154686/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04755200X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:55Z |
institution | BVB |
isbn | 9781119154693 1119154693 9781119154686 1119154685 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 390 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
series2 | --For dummies |
spelling | Beaver, Kevin VerfasserIn aut Hacking for dummies by Kevin Beaver 5th edition. Hoboken, NJ John Wiley & Sons, Inc. [2016] ©2016 1 Online-Ressource (xvi, 390 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier --For dummies Includes bibliographical references and index. - Print version record Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures 9781119154686 Erscheint auch als Druck-Ausgabe 9781119154686 |
spellingShingle | Beaver, Kevin Hacking for dummies Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Hacking for dummies |
title_auth | Hacking for dummies |
title_exact_search | Hacking for dummies |
title_full | Hacking for dummies by Kevin Beaver |
title_fullStr | Hacking for dummies by Kevin Beaver |
title_full_unstemmed | Hacking for dummies by Kevin Beaver |
title_short | Hacking for dummies |
title_sort | hacking for dummies |
topic | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT beaverkevin hackingfordummies |