Ethical hacking masterclass:
"Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen th...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781789530018/?ar |
Zusammenfassung: | "Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker."--Resource description page |
Beschreibung: | Title from resource description page (Safari, viewed October 31, 2018) |
Umfang: | 1 Online-Ressource (1 streaming video file (7 hr., 19 min., 10 sec.)) |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047727403 | ||
003 | DE-627-1 | ||
005 | 20240228120602.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047727403 | ||
035 | |a (DE-599)KEP047727403 | ||
035 | |a (ORHE)9781789530018 | ||
035 | |a (DE-627-1)047727403 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Gupta, Sunil |e RednerIn |4 spk | |
245 | 1 | 0 | |a Ethical hacking masterclass |c Sunil Gupta |
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2018 | |
300 | |a 1 Online-Ressource (1 streaming video file (7 hr., 19 min., 10 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from resource description page (Safari, viewed October 31, 2018) | ||
520 | |a "Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker."--Resource description page | ||
650 | 0 | |a Hacking | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Hacking |0 (OCoLC)fst01909643 | |
650 | 4 | |a Penetration testing (Computer security) |0 (OCoLC)fst01789566 | |
650 | 4 | |a Electronic videos | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781789530018/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047727403 |
---|---|
_version_ | 1821494949169856512 |
adam_text | |
any_adam_object | |
author2 | Gupta, Sunil |
author2_role | spk |
author2_variant | s g sg |
author_facet | Gupta, Sunil |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047727403 (DE-599)KEP047727403 (ORHE)9781789530018 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02591cgm a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047727403</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120602.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047727403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047727403</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781789530018</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047727403</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking masterclass</subfield><subfield code="c">Sunil Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 streaming video file (7 hr., 19 min., 10 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (Safari, viewed October 31, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="0">(OCoLC)fst01909643</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781789530018/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047727403 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:30Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 streaming video file (7 hr., 19 min., 10 sec.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing |
record_format | marc |
spelling | Gupta, Sunil RednerIn spk Ethical hacking masterclass Sunil Gupta [Place of publication not identified] Packt Publishing 2018 1 Online-Ressource (1 streaming video file (7 hr., 19 min., 10 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from resource description page (Safari, viewed October 31, 2018) "Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker."--Resource description page Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 Electronic videos |
spellingShingle | Ethical hacking masterclass Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 Electronic videos |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst00872484 (OCoLC)fst01909643 (OCoLC)fst01789566 |
title | Ethical hacking masterclass |
title_auth | Ethical hacking masterclass |
title_exact_search | Ethical hacking masterclass |
title_full | Ethical hacking masterclass Sunil Gupta |
title_fullStr | Ethical hacking masterclass Sunil Gupta |
title_full_unstemmed | Ethical hacking masterclass Sunil Gupta |
title_short | Ethical hacking masterclass |
title_sort | ethical hacking masterclass |
topic | Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 Electronic videos |
topic_facet | Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures Electronic videos |
work_keys_str_mv | AT guptasunil ethicalhackingmasterclass |