Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Pearson
[2024]
|
Ausgabe: | 4th edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780135395646/?ar |
Zusammenfassung: | The Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed September 9, 2024) |
Umfang: | 1 Online-Ressource (1 video file (12 hr., 3 min.)) sound, color. |
ISBN: | 9780135395646 013539564X |
Internformat
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-108529053 | ||
003 | DE-627-1 | ||
005 | 20241001123229.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 241001s2024 xx ||| |o o ||eng c | ||
020 | |a 9780135395646 |c electronic video |9 978-0-13-539564-6 | ||
020 | |a 013539564X |c electronic video |9 0-13-539564-X | ||
035 | |a (DE-627-1)108529053 | ||
035 | |a (DE-599)KEP108529053 | ||
035 | |a (ORHE)9780135395646 | ||
035 | |a (DE-627-1)108529053 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240909 | |
245 | 0 | 0 | |a Certified Ethical Hacker (CEH) |
250 | |a 4th edition. | ||
264 | 1 | |a [Place of publication not identified] |b Pearson |c [2024] | |
300 | |a 1 Online-Ressource (1 video file (12 hr., 3 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed September 9, 2024) | ||
520 | |a The Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. | ||
650 | 0 | |a Computer security |v Study guides |x Examinations | |
650 | 0 | |a Penetration testing (Computer security) |v Study guides |x Examinations | |
650 | 0 | |a Hacking |v Study guides |x Examinations | |
650 | 0 | |a Computer networks |v Study guides |x Security measures |x Examinations | |
650 | 0 | |a Electronic data processing personnel |x Certification | |
650 | 0 | |a Hackers |v Study guides |x Examinations | |
650 | 4 | |a Sécurité informatique ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Tests d'intrusion ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Piratage informatique ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Pirates informatiques ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Santos, Omar |e MitwirkendeR |4 ctb | |
700 | 1 | |a Garner, Nick |e MitwirkendeR |4 ctb | |
710 | 2 | |a Pearson (Firm), |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780135395646/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-108529053 |
---|---|
_version_ | 1835903243504320512 |
adam_text | |
any_adam_object | |
author2 | Santos, Omar Garner, Nick |
author2_role | ctb ctb |
author2_variant | o s os n g ng |
author_facet | Santos, Omar Garner, Nick |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)108529053 (DE-599)KEP108529053 (ORHE)9780135395646 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 4th edition. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02717ngm a22006012c 4500</leader><controlfield tag="001">ZDB-30-ORH-108529053</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123229.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780135395646</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-0-13-539564-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">013539564X</subfield><subfield code="c">electronic video</subfield><subfield code="9">0-13-539564-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108529053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108529053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780135395646</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108529053</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240909</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Certified Ethical Hacker (CEH)</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4th edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (12 hr., 3 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed September 9, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Study guides</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel</subfield><subfield code="x">Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Santos, Omar</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garner, Nick</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Pearson (Firm),</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780135395646/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-108529053 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:16:10Z |
institution | BVB |
isbn | 9780135395646 013539564X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (12 hr., 3 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Pearson |
record_format | marc |
spelling | Certified Ethical Hacker (CEH) 4th edition. [Place of publication not identified] Pearson [2024] 1 Online-Ressource (1 video file (12 hr., 3 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed September 9, 2024) The Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. Computer security Study guides Examinations Penetration testing (Computer security) Study guides Examinations Hacking Study guides Examinations Computer networks Study guides Security measures Examinations Electronic data processing personnel Certification Hackers Study guides Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Tests d'intrusion ; Examens ; Guides de l'étudiant Piratage informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Pirates informatiques ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Santos, Omar MitwirkendeR ctb Garner, Nick MitwirkendeR ctb Pearson (Firm), Verlag pbl |
spellingShingle | Certified Ethical Hacker (CEH) Computer security Study guides Examinations Penetration testing (Computer security) Study guides Examinations Hacking Study guides Examinations Computer networks Study guides Security measures Examinations Electronic data processing personnel Certification Hackers Study guides Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Tests d'intrusion ; Examens ; Guides de l'étudiant Piratage informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Pirates informatiques ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Certified Ethical Hacker (CEH) |
title_auth | Certified Ethical Hacker (CEH) |
title_exact_search | Certified Ethical Hacker (CEH) |
title_full | Certified Ethical Hacker (CEH) |
title_fullStr | Certified Ethical Hacker (CEH) |
title_full_unstemmed | Certified Ethical Hacker (CEH) |
title_short | Certified Ethical Hacker (CEH) |
title_sort | certified ethical hacker ceh |
topic | Computer security Study guides Examinations Penetration testing (Computer security) Study guides Examinations Hacking Study guides Examinations Computer networks Study guides Security measures Examinations Electronic data processing personnel Certification Hackers Study guides Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Tests d'intrusion ; Examens ; Guides de l'étudiant Piratage informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Pirates informatiques ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Study guides Examinations Penetration testing (Computer security) Study guides Examinations Hacking Study guides Examinations Computer networks Study guides Security measures Examinations Electronic data processing personnel Certification Hackers Study guides Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Tests d'intrusion ; Examens ; Guides de l'étudiant Piratage informatique ; Examens ; Guides de l'étudiant Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Pirates informatiques ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT santosomar certifiedethicalhackerceh AT garnernick certifiedethicalhackerceh AT pearsonfirm certifiedethicalhackerceh |