From Hacking to Report Writing An Introduction to Security and Penetration Testing

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Svensson, Robert (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berkeley, CA Apress 2016
Schlagworte:
Online-Zugang:FHM01
FHN01
FHO01
FHR01
FKE01
FWS01
FWS02
UBW01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043932946
003 DE-604
005 20190516
007 cr|uuu---uuuuu
008 161205s2016 |||| o||u| ||||||eng d
020 |a 9781484222836  |c Online  |9 978-1-4842-2283-6 
024 7 |a 10.1007/978-1-4842-2283-6  |2 doi 
035 |a (ZDB-2-CWD)978-1-4842-2283-6 
035 |a (OCoLC)965652187 
035 |a (DE-599)BVBBV043932946 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-898  |a DE-M347  |a DE-859  |a DE-863  |a DE-20  |a DE-1051  |a DE-92  |a DE-862 
082 0 |a 004 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Svensson, Robert  |e Verfasser  |0 (DE-588)1121708439  |4 aut 
245 1 0 |a From Hacking to Report Writing  |b An Introduction to Security and Penetration Testing  |c by Robert Svensson 
264 1 |a Berkeley, CA  |b Apress  |c 2016 
300 |a 1 Online-Ressource (XXII, 190 Seiten)  |b 79 Illustrationen, 53 Illustrationen (farbig) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 4 |a Computer science 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer Science 
650 4 |a Security 
650 4 |a Systems and Data Security 
650 4 |a Data Encryption 
650 4 |a Informatik 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4842-2282-9  |w (DE-604)BV043931615 
856 4 0 |u https://doi.org/10.1007/978-1-4842-2283-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-CWD 
940 1 |q ZDB-2-CWD_2016 
999 |a oai:aleph.bib-bvb.de:BVB01-029341961 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FHM01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FHN01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FHO01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FHR01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FKE01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FWS01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l FWS02  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-2283-6  |l UBW01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 632906
_version_ 1806180382197940224
any_adam_object
author Svensson, Robert
author_GND (DE-588)1121708439
author_facet Svensson, Robert
author_role aut
author_sort Svensson, Robert
author_variant r s rs
building Verbundindex
bvnumber BV043932946
classification_rvk ST 277
collection ZDB-2-CWD
ctrlnum (ZDB-2-CWD)978-1-4842-2283-6
(OCoLC)965652187
(DE-599)BVBBV043932946
dewey-full 004
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004
dewey-search 004
dewey-sort 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-1-4842-2283-6
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02505nmm a2200577zc 4500</leader><controlfield tag="001">BV043932946</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190516 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161205s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484222836</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-2283-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-2283-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)978-1-4842-2283-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)965652187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043932946</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Svensson, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1121708439</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From Hacking to Report Writing</subfield><subfield code="b">An Introduction to Security and Penetration Testing</subfield><subfield code="c">by Robert Svensson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 190 Seiten)</subfield><subfield code="b">79 Illustrationen, 53 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-2282-9</subfield><subfield code="w">(DE-604)BV043931615</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029341961</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043932946
illustrated Not Illustrated
indexdate 2024-08-01T12:23:59Z
institution BVB
isbn 9781484222836
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029341961
oclc_num 965652187
open_access_boolean
owner DE-898
DE-BY-UBR
DE-M347
DE-859
DE-863
DE-BY-FWS
DE-20
DE-1051
DE-92
DE-862
DE-BY-FWS
owner_facet DE-898
DE-BY-UBR
DE-M347
DE-859
DE-863
DE-BY-FWS
DE-20
DE-1051
DE-92
DE-862
DE-BY-FWS
physical 1 Online-Ressource (XXII, 190 Seiten) 79 Illustrationen, 53 Illustrationen (farbig)
psigel ZDB-2-CWD
ZDB-2-CWD_2016
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Apress
record_format marc
spellingShingle Svensson, Robert
From Hacking to Report Writing An Introduction to Security and Penetration Testing
Computer science
Computer security
Data encryption (Computer science)
Computer Science
Security
Systems and Data Security
Data Encryption
Informatik
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4274324-2
title From Hacking to Report Writing An Introduction to Security and Penetration Testing
title_auth From Hacking to Report Writing An Introduction to Security and Penetration Testing
title_exact_search From Hacking to Report Writing An Introduction to Security and Penetration Testing
title_full From Hacking to Report Writing An Introduction to Security and Penetration Testing by Robert Svensson
title_fullStr From Hacking to Report Writing An Introduction to Security and Penetration Testing by Robert Svensson
title_full_unstemmed From Hacking to Report Writing An Introduction to Security and Penetration Testing by Robert Svensson
title_short From Hacking to Report Writing
title_sort from hacking to report writing an introduction to security and penetration testing
title_sub An Introduction to Security and Penetration Testing
topic Computer science
Computer security
Data encryption (Computer science)
Computer Science
Security
Systems and Data Security
Data Encryption
Informatik
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Computer science
Computer security
Data encryption (Computer science)
Computer Science
Security
Systems and Data Security
Data Encryption
Informatik
Computersicherheit
url https://doi.org/10.1007/978-1-4842-2283-6
work_keys_str_mv AT svenssonrobert fromhackingtoreportwritinganintroductiontosecurityandpenetrationtesting