Hacking the hacker: learn from the experts who take down hackers
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, des...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Old Saybrook, Conn.
Tantor Media
℗2019
|
Ausgabe: | Unabridged. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781618039330/?ar |
Zusammenfassung: | Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look. |
Beschreibung: | Downloadable audio file |
Umfang: | 1 Online-Ressource |
ISBN: | 1618039334 9781618039330 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-071017054 | ||
003 | DE-627-1 | ||
005 | 20240228120857.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211206s2019 xx |||||o 00| ||eng c | ||
020 | |a 1618039334 |9 1-61803-933-4 | ||
020 | |a 9781618039330 |c electronic audio bk. |9 978-1-61803-933-0 | ||
035 | |a (DE-627-1)071017054 | ||
035 | |a (DE-599)KEP071017054 | ||
035 | |a (ORHE)9781618039330 | ||
035 | |a (DE-627-1)071017054 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/7 |2 23 | |
100 | 1 | |a Grimes, Roger A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking the hacker |b learn from the experts who take down hackers |c Roger A. Grimes |
250 | |a Unabridged. | ||
264 | 1 | |a Old Saybrook, Conn. |b Tantor Media |c ℗2019 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Downloadable audio file | ||
520 | |a Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look. | ||
650 | 0 | |a Computers | |
650 | 0 | |a Electronic digital computers | |
650 | 4 | |a Ordinateurs | |
650 | 4 | |a computers | |
650 | 4 | |a COMPUTERS ; General | |
650 | 4 | |a Electronic digital computers | |
650 | 4 | |a Computers | |
650 | 4 | |a Downloadable audio books | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Ross, Jonathan Todd |e ErzählerIn |4 nrt | |
710 | 2 | |a Tantor Media. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781618039330/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-071017054 |
---|---|
_version_ | 1821494827133435904 |
adam_text | |
any_adam_object | |
author | Grimes, Roger A. |
author2 | Ross, Jonathan Todd |
author2_role | nrt |
author2_variant | j t r jt jtr |
author_corporate | Tantor Media |
author_corporate_role | ctb |
author_facet | Grimes, Roger A. Ross, Jonathan Todd Tantor Media |
author_role | aut |
author_sort | Grimes, Roger A. |
author_variant | r a g ra rag |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)071017054 (DE-599)KEP071017054 (ORHE)9781618039330 |
dewey-full | 005.8/7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/7 |
dewey-search | 005.8/7 |
dewey-sort | 15.8 17 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Unabridged. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02808cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-071017054</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120857.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1618039334</subfield><subfield code="9">1-61803-933-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781618039330</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-61803-933-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)071017054</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP071017054</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781618039330</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)071017054</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Grimes, Roger A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking the hacker</subfield><subfield code="b">learn from the experts who take down hackers</subfield><subfield code="c">Roger A. Grimes</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Unabridged.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Old Saybrook, Conn.</subfield><subfield code="b">Tantor Media</subfield><subfield code="c">℗2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Downloadable audio file</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic digital computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic digital computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Downloadable audio books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Jonathan Todd</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Tantor Media.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781618039330/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-071017054 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:34Z |
institution | BVB |
isbn | 1618039334 9781618039330 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Tantor Media |
record_format | marc |
spelling | Grimes, Roger A. VerfasserIn aut Hacking the hacker learn from the experts who take down hackers Roger A. Grimes Unabridged. Old Saybrook, Conn. Tantor Media ℗2019 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Downloadable audio file Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look. Computers Electronic digital computers Ordinateurs computers COMPUTERS ; General Downloadable audio books Audiobooks Livres audio Ross, Jonathan Todd ErzählerIn nrt Tantor Media. MitwirkendeR ctb |
spellingShingle | Grimes, Roger A. Hacking the hacker learn from the experts who take down hackers Computers Electronic digital computers Ordinateurs computers COMPUTERS ; General Downloadable audio books Audiobooks Livres audio |
title | Hacking the hacker learn from the experts who take down hackers |
title_auth | Hacking the hacker learn from the experts who take down hackers |
title_exact_search | Hacking the hacker learn from the experts who take down hackers |
title_full | Hacking the hacker learn from the experts who take down hackers Roger A. Grimes |
title_fullStr | Hacking the hacker learn from the experts who take down hackers Roger A. Grimes |
title_full_unstemmed | Hacking the hacker learn from the experts who take down hackers Roger A. Grimes |
title_short | Hacking the hacker |
title_sort | hacking the hacker learn from the experts who take down hackers |
title_sub | learn from the experts who take down hackers |
topic | Computers Electronic digital computers Ordinateurs computers COMPUTERS ; General Downloadable audio books Audiobooks Livres audio |
topic_facet | Computers Electronic digital computers Ordinateurs computers COMPUTERS ; General Downloadable audio books Audiobooks Livres audio |
work_keys_str_mv | AT grimesrogera hackingthehackerlearnfromtheexpertswhotakedownhackers AT rossjonathantodd hackingthehackerlearnfromtheexpertswhotakedownhackers AT tantormedia hackingthehackerlearnfromtheexpertswhotakedownhackers |