Tribe of hackers: cybersecurity advice from the best hackers in the world
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hac...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, Indiana
Wiley
[2019]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119643371/?ar |
Summary: | Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. |
Item Description: | Includes bibliographical references. - Online resource; title from digital title page (viewed on September 19, 2019) |
Physical Description: | 1 online resource (ix, 285 pages) illustrations |
ISBN: | 1119643406 9781119643388 1119643384 9781119643395 1119643392 9781119643401 9781119643371 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-049358537 | ||
003 | DE-627-1 | ||
005 | 20240228120837.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200120s2019 xx |||||o 00| ||eng c | ||
020 | |a 1119643406 |c electronic book |9 1-119-64340-6 | ||
020 | |a 9781119643388 |c electronic book |9 978-1-119-64338-8 | ||
020 | |a 1119643384 |c electronic book |9 1-119-64338-4 | ||
020 | |a 9781119643395 |c electronic book |9 978-1-119-64339-5 | ||
020 | |a 1119643392 |c electronic book |9 1-119-64339-2 | ||
020 | |a 9781119643401 |c electronic bk. |9 978-1-119-64340-1 | ||
020 | |a 9781119643371 |9 978-1-119-64337-1 | ||
035 | |a (DE-627-1)049358537 | ||
035 | |a (DE-599)KEP049358537 | ||
035 | |a (ORHE)9781119643371 | ||
035 | |a (DE-627-1)049358537 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Carey, Marcus J. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Tribe of hackers |b cybersecurity advice from the best hackers in the world |c Marcus J. Carey & Jennifer Jin |
264 | 1 | |a Indianapolis, Indiana |b Wiley |c [2019] | |
300 | |a 1 online resource (ix, 285 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from digital title page (viewed on September 19, 2019) | ||
520 | |a Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Data protection | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Risk management | |
650 | 0 | |a Business enterprises |x Security measures | |
650 | 0 | |a Computers | |
650 | 0 | |a Electronic digital computers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a Entreprises ; Sécurité ; Mesures | |
650 | 4 | |a Ordinateurs | |
650 | 4 | |a risk management | |
650 | 4 | |a computers | |
650 | 4 | |a COMPUTERS ; Security ; Cryptography | |
650 | 4 | |a Electronic digital computers | |
650 | 4 | |a Risk management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Business enterprises ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
700 | 1 | |a Jin, Jennifer |e VerfasserIn |4 aut | |
776 | 1 | |z 9781119643371 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119643371 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119643371/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-049358537 |
---|---|
_version_ | 1833357052769992704 |
adam_text | |
any_adam_object | |
author | Carey, Marcus J. Jin, Jennifer |
author_facet | Carey, Marcus J. Jin, Jennifer |
author_role | aut aut |
author_sort | Carey, Marcus J. |
author_variant | m j c mj mjc j j jj |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)049358537 (DE-599)KEP049358537 (ORHE)9781119643371 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03132cam a22007212c 4500</leader><controlfield tag="001">ZDB-30-ORH-049358537</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120837.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200120s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643406</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-64340-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643388</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-64338-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643384</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-64338-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643395</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-64339-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643392</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-64339-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643401</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64340-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643371</subfield><subfield code="9">978-1-119-64337-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)049358537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP049358537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119643371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)049358537</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carey, Marcus J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Tribe of hackers</subfield><subfield code="b">cybersecurity advice from the best hackers in the world</subfield><subfield code="c">Marcus J. Carey & Jennifer Jin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Indiana</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 285 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from digital title page (viewed on September 19, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic digital computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entreprises ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic digital computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Jennifer</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119643371</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119643371</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119643371/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-049358537 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:33Z |
institution | BVB |
isbn | 1119643406 9781119643388 1119643384 9781119643395 1119643392 9781119643401 9781119643371 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (ix, 285 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Wiley |
record_format | marc |
spelling | Carey, Marcus J. VerfasserIn aut Tribe of hackers cybersecurity advice from the best hackers in the world Marcus J. Carey & Jennifer Jin Indianapolis, Indiana Wiley [2019] 1 online resource (ix, 285 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from digital title page (viewed on September 19, 2019) Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. Computer security Data protection Computer networks Security measures Risk management Business enterprises Security measures Computers Electronic digital computers Sécurité informatique Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion du risque Entreprises ; Sécurité ; Mesures Ordinateurs risk management computers COMPUTERS ; Security ; Cryptography Computer networks ; Security measures Business enterprises ; Security measures Jin, Jennifer VerfasserIn aut 9781119643371 Erscheint auch als Druck-Ausgabe 9781119643371 |
spellingShingle | Carey, Marcus J. Jin, Jennifer Tribe of hackers cybersecurity advice from the best hackers in the world Computer security Data protection Computer networks Security measures Risk management Business enterprises Security measures Computers Electronic digital computers Sécurité informatique Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion du risque Entreprises ; Sécurité ; Mesures Ordinateurs risk management computers COMPUTERS ; Security ; Cryptography Computer networks ; Security measures Business enterprises ; Security measures |
title | Tribe of hackers cybersecurity advice from the best hackers in the world |
title_auth | Tribe of hackers cybersecurity advice from the best hackers in the world |
title_exact_search | Tribe of hackers cybersecurity advice from the best hackers in the world |
title_full | Tribe of hackers cybersecurity advice from the best hackers in the world Marcus J. Carey & Jennifer Jin |
title_fullStr | Tribe of hackers cybersecurity advice from the best hackers in the world Marcus J. Carey & Jennifer Jin |
title_full_unstemmed | Tribe of hackers cybersecurity advice from the best hackers in the world Marcus J. Carey & Jennifer Jin |
title_short | Tribe of hackers |
title_sort | tribe of hackers cybersecurity advice from the best hackers in the world |
title_sub | cybersecurity advice from the best hackers in the world |
topic | Computer security Data protection Computer networks Security measures Risk management Business enterprises Security measures Computers Electronic digital computers Sécurité informatique Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion du risque Entreprises ; Sécurité ; Mesures Ordinateurs risk management computers COMPUTERS ; Security ; Cryptography Computer networks ; Security measures Business enterprises ; Security measures |
topic_facet | Computer security Data protection Computer networks Security measures Risk management Business enterprises Security measures Computers Electronic digital computers Sécurité informatique Protection de l'information (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures Gestion du risque Entreprises ; Sécurité ; Mesures Ordinateurs risk management computers COMPUTERS ; Security ; Cryptography Computer networks ; Security measures Business enterprises ; Security measures |
work_keys_str_mv | AT careymarcusj tribeofhackerscybersecurityadvicefromthebesthackersintheworld AT jinjennifer tribeofhackerscybersecurityadvicefromthebesthackersintheworld |