Dissecting the hack: the f0rb1dd3n network
"Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half refere...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, Mass.
Syngress/Elsevier
2010
|
Ausgabe: | Rev. ed. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597495684/?ar |
Zusammenfassung: | "Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xx, 333 Seiten) illustrations |
ISBN: | 9781597495691 1597495697 1597495689 9781597495684 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04764799X | ||
003 | DE-627-1 | ||
005 | 20240228114711.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2010 xx |||||o 00| ||eng c | ||
020 | |a 9781597495691 |9 978-1-59749-569-1 | ||
020 | |a 1597495697 |9 1-59749-569-7 | ||
020 | |a 1597495689 |9 1-59749-568-9 | ||
020 | |a 9781597495684 |9 978-1-59749-568-4 | ||
020 | |a 9781597495684 |9 978-1-59749-568-4 | ||
035 | |a (DE-627-1)04764799X | ||
035 | |a (DE-599)KEP04764799X | ||
035 | |a (ORHE)9781597495684 | ||
035 | |a (DE-627-1)04764799X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 364.16/8 |2 22 | |
245 | 1 | 0 | |a Dissecting the hack |b the f0rb1dd3n network |c Jayson E. Street [and others] |
250 | |a Rev. ed. | ||
264 | 1 | |a Burlington, Mass. |b Syngress/Elsevier |c 2010 | |
300 | |a 1 Online-Ressource (xx, 333 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page. | ||
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Computer crimes |v Case studies | |
650 | 0 | |a Hackers | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Criminalité informatique ; Études de cas | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Computer crimes ; Case studies | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Case studies | |
700 | 1 | |a Street, Jayson E. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597495684 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597495684 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597495684/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04764799X |
---|---|
_version_ | 1821494867429163008 |
adam_text | |
any_adam_object | |
author2 | Street, Jayson E. |
author2_role | ctb |
author2_variant | j e s je jes |
author_facet | Street, Jayson E. |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04764799X (DE-599)KEP04764799X (ORHE)9781597495684 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
edition | Rev. ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03135cam a22006732 4500</leader><controlfield tag="001">ZDB-30-ORH-04764799X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114711.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495691</subfield><subfield code="9">978-1-59749-569-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495697</subfield><subfield code="9">1-59749-569-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495689</subfield><subfield code="9">1-59749-568-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495684</subfield><subfield code="9">978-1-59749-568-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495684</subfield><subfield code="9">978-1-59749-568-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764799X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04764799X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597495684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764799X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dissecting the hack</subfield><subfield code="b">the f0rb1dd3n network</subfield><subfield code="c">Jayson E. Street [and others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Rev. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 333 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Études de cas</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Case studies</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Street, Jayson E.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597495684</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597495684</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597495684/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04764799X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597495691 1597495697 1597495689 9781597495684 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 333 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Dissecting the hack the f0rb1dd3n network Jayson E. Street [and others] Rev. ed. Burlington, Mass. Syngress/Elsevier 2010 1 Online-Ressource (xx, 333 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record "Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page. Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security Criminalité informatique ; Enquêtes Criminalité informatique ; Études de cas Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer crimes ; Investigation Computer crimes ; Case studies Computer hackers Computer networks ; Security measures Computer crimes Case studies Street, Jayson E. MitwirkendeR ctb 9781597495684 Erscheint auch als Druck-Ausgabe 9781597495684 |
spellingShingle | Dissecting the hack the f0rb1dd3n network Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security Criminalité informatique ; Enquêtes Criminalité informatique ; Études de cas Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer crimes ; Investigation Computer crimes ; Case studies Computer hackers Computer networks ; Security measures Computer crimes Case studies |
title | Dissecting the hack the f0rb1dd3n network |
title_auth | Dissecting the hack the f0rb1dd3n network |
title_exact_search | Dissecting the hack the f0rb1dd3n network |
title_full | Dissecting the hack the f0rb1dd3n network Jayson E. Street [and others] |
title_fullStr | Dissecting the hack the f0rb1dd3n network Jayson E. Street [and others] |
title_full_unstemmed | Dissecting the hack the f0rb1dd3n network Jayson E. Street [and others] |
title_short | Dissecting the hack |
title_sort | dissecting the hack the f0rb1dd3n network |
title_sub | the f0rb1dd3n network |
topic | Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security Criminalité informatique ; Enquêtes Criminalité informatique ; Études de cas Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer crimes ; Investigation Computer crimes ; Case studies Computer hackers Computer networks ; Security measures Computer crimes Case studies |
topic_facet | Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security Criminalité informatique ; Enquêtes Criminalité informatique ; Études de cas Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer crimes ; Investigation Computer crimes ; Case studies Computer hackers Computer networks ; Security measures Computer crimes Case studies |
work_keys_str_mv | AT streetjaysone dissectingthehackthef0rb1dd3nnetwork |