Ethical hacking: learning the basics
"The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Apress
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484243480/?ar |
Zusammenfassung: | "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page |
Beschreibung: | Title from resource description page (Safari, viewed January 18, 2019) |
Umfang: | 1 Online-Ressource (1 streaming video file (1 hr., 5 min., 27 sec.)) |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047610166 | ||
003 | DE-627-1 | ||
005 | 20240228120633.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047610166 | ||
035 | |a (DE-599)KEP047610166 | ||
035 | |a (ORHE)9781484243480 | ||
035 | |a (DE-627-1)047610166 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Gupta, Sunil |e RednerIn |4 spk | |
245 | 1 | 0 | |a Ethical hacking |b learning the basics |c Sunil Gupta |
264 | 1 | |a [Place of publication not identified] |b Apress |c 2018 | |
300 | |a 1 Online-Ressource (1 streaming video file (1 hr., 5 min., 27 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from resource description page (Safari, viewed January 18, 2019) | ||
520 | |a "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page | ||
650 | 0 | |a Hacking | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Hacking |0 (OCoLC)fst01909643 | |
650 | 4 | |a Penetration testing (Computer security) |0 (OCoLC)fst01789566 | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484243480/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047610166 |
---|---|
_version_ | 1821494951802830848 |
adam_text | |
any_adam_object | |
author2 | Gupta, Sunil |
author2_role | spk |
author2_variant | s g sg |
author_facet | Gupta, Sunil |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047610166 (DE-599)KEP047610166 (ORHE)9781484243480 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02401cgm a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-047610166</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120633.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047610166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484243480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610166</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">learning the basics</subfield><subfield code="c">Sunil Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 streaming video file (1 hr., 5 min., 27 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (Safari, viewed January 18, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="0">(OCoLC)fst01909643</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484243480/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047610166 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:32Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 streaming video file (1 hr., 5 min., 27 sec.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Gupta, Sunil RednerIn spk Ethical hacking learning the basics Sunil Gupta [Place of publication not identified] Apress 2018 1 Online-Ressource (1 streaming video file (1 hr., 5 min., 27 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from resource description page (Safari, viewed January 18, 2019) "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
spellingShingle | Ethical hacking learning the basics Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst00872484 (OCoLC)fst01909643 (OCoLC)fst01789566 |
title | Ethical hacking learning the basics |
title_auth | Ethical hacking learning the basics |
title_exact_search | Ethical hacking learning the basics |
title_full | Ethical hacking learning the basics Sunil Gupta |
title_fullStr | Ethical hacking learning the basics Sunil Gupta |
title_full_unstemmed | Ethical hacking learning the basics Sunil Gupta |
title_short | Ethical hacking |
title_sort | ethical hacking learning the basics |
title_sub | learning the basics |
topic | Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
topic_facet | Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
work_keys_str_mv | AT guptasunil ethicalhackinglearningthebasics |