Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Chauhan, Ajay Singh (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Birmingham, Mumbai Packt 2018
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV045449837
003 DE-604
005 20200408
007 t|
008 190207s2018 xx a||| |||| 00||| eng d
020 |a 9781788839235  |9 978-1-78883-923-5 
035 |a (OCoLC)1104872808 
035 |a (DE-599)BVBBV045449837 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-11 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a ST 200  |0 (DE-625)143611:  |2 rvk 
100 1 |a Chauhan, Ajay Singh  |e Verfasser  |4 aut 
245 1 0 |a Practical network scanning  |b capture network vulnerabilities using standard tools such as Nmap and Nessus  |c Ajay Singh Chauhan 
264 1 |a Birmingham, Mumbai  |b Packt  |c 2018 
264 4 |c © 2018 
300 |a VIII, 311 Seiten  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 0 7 |a Penetrationstest  |0 (DE-588)4825817-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Penetrationstest  |0 (DE-588)4825817-9  |D s 
689 0 |5 DE-604 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-1-78883-249-6 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030835245 

Datensatz im Suchindex

_version_ 1819304296624160768
any_adam_object
author Chauhan, Ajay Singh
author_facet Chauhan, Ajay Singh
author_role aut
author_sort Chauhan, Ajay Singh
author_variant a s c as asc
building Verbundindex
bvnumber BV045449837
classification_rvk ST 277
ST 200
ctrlnum (OCoLC)1104872808
(DE-599)BVBBV045449837
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01253nam a2200361 c 4500</leader><controlfield tag="001">BV045449837</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200408 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">190207s2018 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788839235</subfield><subfield code="9">978-1-78883-923-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104872808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045449837</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chauhan, Ajay Singh</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical network scanning</subfield><subfield code="b">capture network vulnerabilities using standard tools such as Nmap and Nessus</subfield><subfield code="c">Ajay Singh Chauhan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 311 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-78883-249-6</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030835245</subfield></datafield></record></collection>
id DE-604.BV045449837
illustrated Illustrated
indexdate 2024-12-24T07:03:01Z
institution BVB
isbn 9781788839235
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030835245
oclc_num 1104872808
open_access_boolean
owner DE-11
owner_facet DE-11
physical VIII, 311 Seiten Illustrationen
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Packt
record_format marc
spelling Chauhan, Ajay Singh Verfasser aut
Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan
Birmingham, Mumbai Packt 2018
© 2018
VIII, 311 Seiten Illustrationen
txt rdacontent
n rdamedia
nc rdacarrier
Penetrationstest (DE-588)4825817-9 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 s
Penetrationstest (DE-588)4825817-9 s
DE-604
Erscheint auch als Online-Ausgabe 978-1-78883-249-6
spellingShingle Chauhan, Ajay Singh
Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus
Penetrationstest (DE-588)4825817-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4825817-9
(DE-588)4274324-2
title Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus
title_auth Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus
title_exact_search Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus
title_full Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan
title_fullStr Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan
title_full_unstemmed Practical network scanning capture network vulnerabilities using standard tools such as Nmap and Nessus Ajay Singh Chauhan
title_short Practical network scanning
title_sort practical network scanning capture network vulnerabilities using standard tools such as nmap and nessus
title_sub capture network vulnerabilities using standard tools such as Nmap and Nessus
topic Penetrationstest (DE-588)4825817-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Penetrationstest
Computersicherheit
work_keys_str_mv AT chauhanajaysingh practicalnetworkscanningcapturenetworkvulnerabilitiesusingstandardtoolssuchasnmapandnessus