Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers

Annotation

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Chebbi, Chiheb (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing 2018
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047717343
003 DE-627-1
005 20240228120453.0
007 cr uuu---uuuuu
008 191023s2018 xx |||||o 00| ||eng c
020 |a 9781788623414  |9 978-1-78862-341-4 
020 |a 178862341X  |9 1-78862-341-X 
020 |a 1788624483  |9 1-78862-448-3 
020 |a 9781788624480  |9 978-1-78862-448-0 
020 |a 9781788624480  |9 978-1-78862-448-0 
035 |a (DE-627-1)047717343 
035 |a (DE-599)KEP047717343 
035 |a (ORHE)9781788624480 
035 |a (DE-627-1)047717343 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8092  |2 23 
100 1 |a Chebbi, Chiheb  |e VerfasserIn  |4 aut 
245 1 0 |a Advanced infrastructure penetration testing  |b defend your systems from methodized and proficient attackers  |c Chiheb Chebbi 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2018 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title page (viewed April 2, 2018) 
520 |a Annotation 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer security  |x Testing 
650 0 |a Computer networks  |x Security measures 
650 4 |a Tests d'intrusion 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Operating systems 
650 4 |a Network security 
650 4 |a Computer security 
650 4 |a Computers ; Networking ; Security 
650 4 |a Computers ; Operating Systems ; General 
650 4 |a Computers ; Security ; General 
650 4 |a Computer networks ; Security measures 
650 4 |a Penetration testing (Computer security) 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781788624480/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047717343
_version_ 1818767293644013568
adam_text
any_adam_object
author Chebbi, Chiheb
author_facet Chebbi, Chiheb
author_role aut
author_sort Chebbi, Chiheb
author_variant c c cc
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047717343
(DE-599)KEP047717343
(ORHE)9781788624480
dewey-full 005.8092
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8092
dewey-search 005.8092
dewey-sort 15.8092
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01984cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-047717343</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120453.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788623414</subfield><subfield code="9">978-1-78862-341-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178862341X</subfield><subfield code="9">1-78862-341-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788624483</subfield><subfield code="9">1-78862-448-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788624480</subfield><subfield code="9">978-1-78862-448-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788624480</subfield><subfield code="9">978-1-78862-448-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047717343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047717343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788624480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047717343</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8092</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chebbi, Chiheb</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced infrastructure penetration testing</subfield><subfield code="b">defend your systems from methodized and proficient attackers</subfield><subfield code="c">Chiheb Chebbi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (viewed April 2, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Operating Systems ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788624480/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047717343
illustrated Illustrated
indexdate 2024-12-18T08:47:35Z
institution BVB
isbn 9781788623414
178862341X
1788624483
9781788624480
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Packt Publishing
record_format marc
spelling Chebbi, Chiheb VerfasserIn aut
Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers Chiheb Chebbi
Birmingham, UK Packt Publishing 2018
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title page (viewed April 2, 2018)
Annotation
Penetration testing (Computer security)
Computer security Testing
Computer networks Security measures
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Operating systems
Network security
Computer security
Computers ; Networking ; Security
Computers ; Operating Systems ; General
Computers ; Security ; General
Computer networks ; Security measures
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781788624480/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Chebbi, Chiheb
Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers
Penetration testing (Computer security)
Computer security Testing
Computer networks Security measures
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Operating systems
Network security
Computer security
Computers ; Networking ; Security
Computers ; Operating Systems ; General
Computers ; Security ; General
Computer networks ; Security measures
title Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers
title_auth Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers
title_exact_search Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers
title_full Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers Chiheb Chebbi
title_fullStr Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers Chiheb Chebbi
title_full_unstemmed Advanced infrastructure penetration testing defend your systems from methodized and proficient attackers Chiheb Chebbi
title_short Advanced infrastructure penetration testing
title_sort advanced infrastructure penetration testing defend your systems from methodized and proficient attackers
title_sub defend your systems from methodized and proficient attackers
topic Penetration testing (Computer security)
Computer security Testing
Computer networks Security measures
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Operating systems
Network security
Computer security
Computers ; Networking ; Security
Computers ; Operating Systems ; General
Computers ; Security ; General
Computer networks ; Security measures
topic_facet Penetration testing (Computer security)
Computer security Testing
Computer networks Security measures
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Operating systems
Network security
Computer security
Computers ; Networking ; Security
Computers ; Operating Systems ; General
Computers ; Security ; General
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781788624480/?ar
work_keys_str_mv AT chebbichiheb advancedinfrastructurepenetrationtestingdefendyoursystemsfrommethodizedandproficientattackers