From Hacking to Report Writing An Introduction to Security and Penetration Testing
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2016
|
Schlagworte: | |
Online-Zugang: | FHM01 FHN01 FHO01 FHR01 FKE01 FWS01 FWS02 UBW01 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043932946 | ||
003 | DE-604 | ||
005 | 20190516 | ||
007 | cr|uuu---uuuuu | ||
008 | 161205s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781484222836 |c Online |9 978-1-4842-2283-6 | ||
024 | 7 | |a 10.1007/978-1-4842-2283-6 |2 doi | |
035 | |a (ZDB-2-CWD)978-1-4842-2283-6 | ||
035 | |a (OCoLC)965652187 | ||
035 | |a (DE-599)BVBBV043932946 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-M347 |a DE-859 |a DE-863 |a DE-20 |a DE-1051 |a DE-92 |a DE-862 | ||
082 | 0 | |a 004 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Svensson, Robert |e Verfasser |0 (DE-588)1121708439 |4 aut | |
245 | 1 | 0 | |a From Hacking to Report Writing |b An Introduction to Security and Penetration Testing |c by Robert Svensson |
264 | 1 | |a Berkeley, CA |b Apress |c 2016 | |
300 | |a 1 Online-Ressource (XXII, 190 Seiten) |b 79 Illustrationen, 53 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Security | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-2282-9 |w (DE-604)BV043931615 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4842-2283-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029341961 | ||
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FHO01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FKE01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-2283-6 |l UBW01 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 632906 |
---|---|
_version_ | 1806180382197940224 |
any_adam_object | |
author | Svensson, Robert |
author_GND | (DE-588)1121708439 |
author_facet | Svensson, Robert |
author_role | aut |
author_sort | Svensson, Robert |
author_variant | r s rs |
building | Verbundindex |
bvnumber | BV043932946 |
classification_rvk | ST 277 |
collection | ZDB-2-CWD |
ctrlnum | (ZDB-2-CWD)978-1-4842-2283-6 (OCoLC)965652187 (DE-599)BVBBV043932946 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4842-2283-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02505nmm a2200577zc 4500</leader><controlfield tag="001">BV043932946</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190516 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161205s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484222836</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-2283-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-2283-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)978-1-4842-2283-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)965652187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043932946</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Svensson, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1121708439</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">From Hacking to Report Writing</subfield><subfield code="b">An Introduction to Security and Penetration Testing</subfield><subfield code="c">by Robert Svensson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 190 Seiten)</subfield><subfield code="b">79 Illustrationen, 53 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-2282-9</subfield><subfield code="w">(DE-604)BV043931615</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029341961</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-2283-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043932946 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:23:59Z |
institution | BVB |
isbn | 9781484222836 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029341961 |
oclc_num | 965652187 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-M347 DE-859 DE-863 DE-BY-FWS DE-20 DE-1051 DE-92 DE-862 DE-BY-FWS |
owner_facet | DE-898 DE-BY-UBR DE-M347 DE-859 DE-863 DE-BY-FWS DE-20 DE-1051 DE-92 DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (XXII, 190 Seiten) 79 Illustrationen, 53 Illustrationen (farbig) |
psigel | ZDB-2-CWD ZDB-2-CWD_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Apress |
record_format | marc |
spellingShingle | Svensson, Robert From Hacking to Report Writing An Introduction to Security and Penetration Testing Computer science Computer security Data encryption (Computer science) Computer Science Security Systems and Data Security Data Encryption Informatik Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | From Hacking to Report Writing An Introduction to Security and Penetration Testing |
title_auth | From Hacking to Report Writing An Introduction to Security and Penetration Testing |
title_exact_search | From Hacking to Report Writing An Introduction to Security and Penetration Testing |
title_full | From Hacking to Report Writing An Introduction to Security and Penetration Testing by Robert Svensson |
title_fullStr | From Hacking to Report Writing An Introduction to Security and Penetration Testing by Robert Svensson |
title_full_unstemmed | From Hacking to Report Writing An Introduction to Security and Penetration Testing by Robert Svensson |
title_short | From Hacking to Report Writing |
title_sort | from hacking to report writing an introduction to security and penetration testing |
title_sub | An Introduction to Security and Penetration Testing |
topic | Computer science Computer security Data encryption (Computer science) Computer Science Security Systems and Data Security Data Encryption Informatik Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Computer Science Security Systems and Data Security Data Encryption Informatik Computersicherheit |
url | https://doi.org/10.1007/978-1-4842-2283-6 |
work_keys_str_mv | AT svenssonrobert fromhackingtoreportwritinganintroductiontosecurityandpenetrationtesting |