Learn social engineering learn the art of human hacking with an internationally renowned expert

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Ozkaya, Erdal (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing 2018
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047720077
003 DE-627-1
005 20240228120511.0
007 cr uuu---uuuuu
008 191023s2018 xx |||||o 00| ||eng c
020 |a 9781788838009  |c electronic bk.  |9 978-1-78883-800-9 
020 |a 1788838009  |c electronic bk.  |9 1-78883-800-9 
020 |a 9781788837927  |9 978-1-78883-792-7 
035 |a (DE-627-1)047720077 
035 |a (DE-599)KEP047720077 
035 |a (ORHE)9781788837927 
035 |a (DE-627-1)047720077 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Ozkaya, Erdal  |e VerfasserIn  |4 aut 
245 1 0 |a Learn social engineering  |b learn the art of human hacking with an internationally renowned expert  |c Dr. Erdal Ozkaya 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2018 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title page (Safari, viewed May 31, 2018) 
630 2 0 |a Kali Linux 
650 0 |a Computer networks  |x Security measures 
650 0 |a Social engineering 
650 0 |a Penetration testing (Computer security) 
650 4 |a Kali Linux 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Ingénierie sociale 
650 4 |a Tests d'intrusion 
650 4 |a Privacy & data protection 
650 4 |a Network security 
650 4 |a Computer security 
650 4 |a COMPUTERS ; Security ; General 
650 4 |a Computer networks ; Security measures 
650 4 |a Penetration testing (Computer security) 
650 4 |a Social engineering 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781788837927/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047720077
_version_ 1818767293329440768
adam_text
any_adam_object
author Ozkaya, Erdal
author_facet Ozkaya, Erdal
author_role aut
author_sort Ozkaya, Erdal
author_variant e o eo
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047720077
(DE-599)KEP047720077
(ORHE)9781788837927
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01944cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-047720077</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120511.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788838009</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78883-800-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788838009</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78883-800-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788837927</subfield><subfield code="9">978-1-78883-792-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047720077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047720077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788837927</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047720077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ozkaya, Erdal</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learn social engineering</subfield><subfield code="b">learn the art of human hacking with an internationally renowned expert</subfield><subfield code="c">Dr. Erdal Ozkaya</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed May 31, 2018)</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingénierie sociale</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy &amp; data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788837927/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047720077
illustrated Illustrated
indexdate 2024-12-18T08:47:35Z
institution BVB
isbn 9781788838009
1788838009
9781788837927
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Packt Publishing
record_format marc
spelling Ozkaya, Erdal VerfasserIn aut
Learn social engineering learn the art of human hacking with an internationally renowned expert Dr. Erdal Ozkaya
Birmingham, UK Packt Publishing 2018
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title page (Safari, viewed May 31, 2018)
Kali Linux
Computer networks Security measures
Social engineering
Penetration testing (Computer security)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Ingénierie sociale
Tests d'intrusion
Privacy & data protection
Network security
Computer security
COMPUTERS ; Security ; General
Computer networks ; Security measures
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781788837927/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Ozkaya, Erdal
Learn social engineering learn the art of human hacking with an internationally renowned expert
Kali Linux
Computer networks Security measures
Social engineering
Penetration testing (Computer security)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Ingénierie sociale
Tests d'intrusion
Privacy & data protection
Network security
Computer security
COMPUTERS ; Security ; General
Computer networks ; Security measures
title Learn social engineering learn the art of human hacking with an internationally renowned expert
title_auth Learn social engineering learn the art of human hacking with an internationally renowned expert
title_exact_search Learn social engineering learn the art of human hacking with an internationally renowned expert
title_full Learn social engineering learn the art of human hacking with an internationally renowned expert Dr. Erdal Ozkaya
title_fullStr Learn social engineering learn the art of human hacking with an internationally renowned expert Dr. Erdal Ozkaya
title_full_unstemmed Learn social engineering learn the art of human hacking with an internationally renowned expert Dr. Erdal Ozkaya
title_short Learn social engineering
title_sort learn social engineering learn the art of human hacking with an internationally renowned expert
title_sub learn the art of human hacking with an internationally renowned expert
topic Kali Linux
Computer networks Security measures
Social engineering
Penetration testing (Computer security)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Ingénierie sociale
Tests d'intrusion
Privacy & data protection
Network security
Computer security
COMPUTERS ; Security ; General
Computer networks ; Security measures
topic_facet Kali Linux
Computer networks Security measures
Social engineering
Penetration testing (Computer security)
Réseaux d'ordinateurs ; Sécurité ; Mesures
Ingénierie sociale
Tests d'intrusion
Privacy & data protection
Network security
Computer security
COMPUTERS ; Security ; General
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781788837927/?ar
work_keys_str_mv AT ozkayaerdal learnsocialengineeringlearntheartofhumanhackingwithaninternationallyrenownedexpert