Hacking for Dummies:
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnera...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Newark
John Wiley & Sons, Incorporated
2018
|
Ausgabe: | 6th ed. |
Schriftenreihe: | --For dummies
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119485476/?ar |
Zusammenfassung: | Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected. |
Beschreibung: | Finding Buffer Overflow Vulnerabilities. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (446 Seiten) |
ISBN: | 9781119485513 1119485517 9781119485544 1119485541 9781119485476 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048552674 | ||
003 | DE-627-1 | ||
005 | 20240228120527.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781119485513 |9 978-1-119-48551-3 | ||
020 | |a 1119485517 |9 1-119-48551-7 | ||
020 | |a 9781119485544 |c electronic bk. |9 978-1-119-48554-4 | ||
020 | |a 1119485541 |c electronic bk. |9 1-119-48554-1 | ||
020 | |a 9781119485476 |9 978-1-119-48547-6 | ||
035 | |a (DE-627-1)048552674 | ||
035 | |a (DE-599)KEP048552674 | ||
035 | |a (ORHE)9781119485476 | ||
035 | |a (DE-627-1)048552674 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Beaver, Kevin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking for Dummies |
250 | |a 6th ed. | ||
264 | 1 | |a Newark |b John Wiley & Sons, Incorporated |c 2018 | |
300 | |a 1 Online-Ressource (446 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a --For dummies | |
500 | |a Finding Buffer Overflow Vulnerabilities. - Includes bibliographical references and index. - Print version record | ||
520 | |a Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Hackers | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
776 | 1 | |z 9781119485476 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119485476 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119485476/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048552674 |
---|---|
_version_ | 1829007762382651392 |
adam_text | |
any_adam_object | |
author | Beaver, Kevin |
author_facet | Beaver, Kevin |
author_role | aut |
author_sort | Beaver, Kevin |
author_variant | k b kb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048552674 (DE-599)KEP048552674 (ORHE)9781119485476 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 6th ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02828cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-048552674</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120527.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119485513</subfield><subfield code="9">978-1-119-48551-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119485517</subfield><subfield code="9">1-119-48551-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119485544</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-48554-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119485541</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-48554-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119485476</subfield><subfield code="9">978-1-119-48547-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048552674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048552674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119485476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048552674</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beaver, Kevin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking for Dummies</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">6th ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Newark</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (446 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">--For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Finding Buffer Overflow Vulnerabilities. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119485476</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119485476</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119485476/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048552674 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:27Z |
institution | BVB |
isbn | 9781119485513 1119485517 9781119485544 1119485541 9781119485476 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (446 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
series2 | --For dummies |
spelling | Beaver, Kevin VerfasserIn aut Hacking for Dummies 6th ed. Newark John Wiley & Sons, Incorporated 2018 1 Online-Ressource (446 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier --For dummies Finding Buffer Overflow Vulnerabilities. - Includes bibliographical references and index. - Print version record Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected. Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures 9781119485476 Erscheint auch als Druck-Ausgabe 9781119485476 |
spellingShingle | Beaver, Kevin Hacking for Dummies Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
title | Hacking for Dummies |
title_auth | Hacking for Dummies |
title_exact_search | Hacking for Dummies |
title_full | Hacking for Dummies |
title_fullStr | Hacking for Dummies |
title_full_unstemmed | Hacking for Dummies |
title_short | Hacking for Dummies |
title_sort | hacking for dummies |
topic | Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
work_keys_str_mv | AT beaverkevin hackingfordummies |