Gray hat hacking: the ethical hacker's handbook
Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains th...
Gespeichert in:
Beteiligte Personen: | , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York [NY]
McGraw-Hill
[2022]
|
Ausgabe: | Sixth edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781264268955/?ar |
Zusammenfassung: | Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains the enemy's weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. Inside, you'll find out how cybercriminals gain access, hijack devices and software, inject malicious code, steal mission-critical data, and plunder entire networks. Internet of Things, hypervisors, and cloud security are thoroughly covered in this state-of-the-art resource. |
Beschreibung: | Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed |
Umfang: | 1 Online-Ressource (xxxiii, 670 Seiten) |
ISBN: | 9781264268955 1264268955 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-077853822 | ||
003 | DE-627-1 | ||
005 | 20240228121553.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220513s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781264268955 |c ebook |9 978-1-264-26895-5 | ||
020 | |a 1264268955 |9 1-264-26895-5 | ||
035 | |a (DE-627-1)077853822 | ||
035 | |a (DE-599)KEP077853822 | ||
035 | |a (ORHE)9781264268955 | ||
035 | |a (DE-627-1)077853822 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Harper, Allen |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Gray hat hacking |b the ethical hacker's handbook |c Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost |
250 | |a Sixth edition. | ||
264 | 1 | |a New York [NY] |b McGraw-Hill |c [2022] | |
300 | |a 1 Online-Ressource (xxxiii, 670 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed | ||
520 | |a Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains the enemy's weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. Inside, you'll find out how cybercriminals gain access, hijack devices and software, inject malicious code, steal mission-critical data, and plunder entire networks. Internet of Things, hypervisors, and cloud security are thoroughly covered in this state-of-the-art resource. | ||
650 | 0 | |a Penetration testing (Computer security) |v Handbooks, manuals, etc | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc | |
650 | 0 | |a Hackers | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Tests d'intrusion ; Guides, manuels, etc | |
650 | 4 | |a Sécurité informatique ; Guides, manuels, etc | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
700 | 1 | |a Linn, Ryan |e VerfasserIn |4 aut | |
700 | 1 | |a Sims, Stephen |e VerfasserIn |4 aut | |
700 | 1 | |a Baucom, Michael |e VerfasserIn |4 aut | |
700 | 1 | |a Fernandez, Daniel |e VerfasserIn |4 aut | |
700 | 1 | |a Tejeda, Huáscar |e VerfasserIn |4 aut | |
700 | 1 | |a Frost, Moses |e VerfasserIn |4 aut | |
776 | 1 | |z 9781264268948 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781264268948 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781264268955/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-077853822 |
---|---|
_version_ | 1821494822217711616 |
adam_text | |
any_adam_object | |
author | Harper, Allen Linn, Ryan Sims, Stephen Baucom, Michael Fernandez, Daniel Tejeda, Huáscar Frost, Moses |
author_facet | Harper, Allen Linn, Ryan Sims, Stephen Baucom, Michael Fernandez, Daniel Tejeda, Huáscar Frost, Moses |
author_role | aut aut aut aut aut aut aut |
author_sort | Harper, Allen |
author_variant | a h ah r l rl s s ss m b mb d f df h t ht m f mf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)077853822 (DE-599)KEP077853822 (ORHE)9781264268955 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Sixth edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02921cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-077853822</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121553.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220513s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781264268955</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-264-26895-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1264268955</subfield><subfield code="9">1-264-26895-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077853822</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077853822</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781264268955</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077853822</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harper, Allen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Gray hat hacking</subfield><subfield code="b">the ethical hacker's handbook</subfield><subfield code="c">Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Sixth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [NY]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiii, 670 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains the enemy's weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. Inside, you'll find out how cybercriminals gain access, hijack devices and software, inject malicious code, steal mission-critical data, and plunder entire networks. Internet of Things, hypervisors, and cloud security are thoroughly covered in this state-of-the-art resource.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Linn, Ryan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sims, Stephen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baucom, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fernandez, Daniel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tejeda, Huáscar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frost, Moses</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781264268948</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781264268948</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781264268955/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-077853822 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:29Z |
institution | BVB |
isbn | 9781264268955 1264268955 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxxiii, 670 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Harper, Allen VerfasserIn aut Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost Sixth edition. New York [NY] McGraw-Hill [2022] 1 Online-Ressource (xxxiii, 670 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains the enemy's weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. Inside, you'll find out how cybercriminals gain access, hijack devices and software, inject malicious code, steal mission-critical data, and plunder entire networks. Internet of Things, hypervisors, and cloud security are thoroughly covered in this state-of-the-art resource. Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Computer security Computer Security Sécurité informatique Pirates informatiques Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Linn, Ryan VerfasserIn aut Sims, Stephen VerfasserIn aut Baucom, Michael VerfasserIn aut Fernandez, Daniel VerfasserIn aut Tejeda, Huáscar VerfasserIn aut Frost, Moses VerfasserIn aut 9781264268948 Erscheint auch als Druck-Ausgabe 9781264268948 |
spellingShingle | Harper, Allen Linn, Ryan Sims, Stephen Baucom, Michael Fernandez, Daniel Tejeda, Huáscar Frost, Moses Gray hat hacking the ethical hacker's handbook Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Computer security Computer Security Sécurité informatique Pirates informatiques Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc |
title | Gray hat hacking the ethical hacker's handbook |
title_auth | Gray hat hacking the ethical hacker's handbook |
title_exact_search | Gray hat hacking the ethical hacker's handbook |
title_full | Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost |
title_fullStr | Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost |
title_full_unstemmed | Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost |
title_short | Gray hat hacking |
title_sort | gray hat hacking the ethical hacker s handbook |
title_sub | the ethical hacker's handbook |
topic | Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Computer security Computer Security Sécurité informatique Pirates informatiques Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc |
topic_facet | Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Computer security Computer Security Sécurité informatique Pirates informatiques Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc |
work_keys_str_mv | AT harperallen grayhathackingtheethicalhackershandbook AT linnryan grayhathackingtheethicalhackershandbook AT simsstephen grayhathackingtheethicalhackershandbook AT baucommichael grayhathackingtheethicalhackershandbook AT fernandezdaniel grayhathackingtheethicalhackershandbook AT tejedahuascar grayhathackingtheethicalhackershandbook AT frostmoses grayhathackingtheethicalhackershandbook |