Hacking:
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, NJ
John Wiley & Sons, Inc.
[2022]
|
Edition: | 7th edition. |
Series: | --For dummies
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119872191/?ar |
Summary: | Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe. |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (416 Seiten). |
ISBN: | 9781119872191 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-07867008X | ||
003 | DE-627-1 | ||
005 | 20240228121652.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220609s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781119872191 |9 978-1-119-87219-1 | ||
035 | |a (DE-627-1)07867008X | ||
035 | |a (DE-599)KEP07867008X | ||
035 | |a (ORHE)9781119872191 | ||
035 | |a (DE-627-1)07867008X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20220503 | |
100 | 1 | |a Beaver, Kevin M. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking |c by Kevin Beaver |
250 | |a 7th edition. | ||
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc. |c [2022] | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (416 Seiten). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a --For dummies | |
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hackers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
776 | 1 | |z 9781119872191 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119872191 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119872191/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-07867008X |
---|---|
_version_ | 1829007734931980288 |
adam_text | |
any_adam_object | |
author | Beaver, Kevin M. |
author_facet | Beaver, Kevin M. |
author_role | aut |
author_sort | Beaver, Kevin M. |
author_variant | k m b km kmb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)07867008X (DE-599)KEP07867008X (ORHE)9781119872191 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 7th edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02937cam a22005052c 4500</leader><controlfield tag="001">ZDB-30-ORH-07867008X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121652.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220609s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119872191</subfield><subfield code="9">978-1-119-87219-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07867008X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP07867008X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119872191</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07867008X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20220503</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beaver, Kevin M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking</subfield><subfield code="c">by Kevin Beaver</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">7th edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (416 Seiten).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">--For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119872191</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119872191</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119872191/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-07867008X |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:01Z |
institution | BVB |
isbn | 9781119872191 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (416 Seiten). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
series2 | --For dummies |
spelling | Beaver, Kevin M. VerfasserIn aut Hacking by Kevin Beaver 7th edition. Hoboken, NJ John Wiley & Sons, Inc. [2022] ©2022 1 Online-Ressource (416 Seiten). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier --For dummies Includes bibliographical references and index. - Print version record Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe. Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques Computer networks ; Security measures 9781119872191 Erscheint auch als Druck-Ausgabe 9781119872191 |
spellingShingle | Beaver, Kevin M. Hacking Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques Computer networks ; Security measures |
title | Hacking |
title_auth | Hacking |
title_exact_search | Hacking |
title_full | Hacking by Kevin Beaver |
title_fullStr | Hacking by Kevin Beaver |
title_full_unstemmed | Hacking by Kevin Beaver |
title_short | Hacking |
title_sort | hacking |
topic | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Hackers Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Pirates informatiques Computer networks ; Security measures |
work_keys_str_mv | AT beaverkevinm hacking |