Network Attacks and Defenses a Hands-on Approach

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Trabelsi, Zouheir (VerfasserIn), Hayawi, Kadhim (VerfasserIn), Al Braiki, Arwa (VerfasserIn), Mathew, Sujith Samuel (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Erscheinungsort nicht ermittelbar] Auerbach Publications 2012
Ausgabe:1st.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-048583421
003 DE-627-1
005 20240228120307.0
007 cr uuu---uuuuu
008 191206s2012 xx |||||o 00| ||eng c
020 |a 9781466517974  |c PDF  |9 978-1-4665-1797-4 
020 |a 1466517972  |c PDF  |9 1-4665-1797-2 
035 |a (DE-627-1)048583421 
035 |a (DE-599)KEP048583421 
035 |a (ORHE)9781466517974 
035 |a (DE-627-1)048583421 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8 
100 1 |a Trabelsi, Zouheir  |e VerfasserIn  |4 aut 
245 1 0 |a Network Attacks and Defenses  |b a Hands-on Approach  |c Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew 
250 |a 1st. 
264 1 |a [Erscheinungsort nicht ermittelbar]  |b Auerbach Publications  |c 2012 
300 |a 1 online resource (475 pages  |b 36 illustrations) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
650 0 |a Computer network  |x Security measures 
650 0 |a Computer networks  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Computer networks ; Security measures  |0 (OCoLC)fst00872341 
700 1 |a Hayawi, Kadhim  |e VerfasserIn  |4 aut 
700 1 |a Al Braiki, Arwa  |e VerfasserIn  |4 aut 
700 1 |a Mathew, Sujith Samuel  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781466517974/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-048583421
_version_ 1818767280546250752
adam_text
any_adam_object
author Trabelsi, Zouheir
Hayawi, Kadhim
Al Braiki, Arwa
Mathew, Sujith Samuel
author_facet Trabelsi, Zouheir
Hayawi, Kadhim
Al Braiki, Arwa
Mathew, Sujith Samuel
author_role aut
aut
aut
aut
author_sort Trabelsi, Zouheir
author_variant z t zt
k h kh
b a a ba baa
s s m ss ssm
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)048583421
(DE-599)KEP048583421
(ORHE)9781466517974
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 1st.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01580cam a22004212 4500</leader><controlfield tag="001">ZDB-30-ORH-048583421</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120307.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466517974</subfield><subfield code="c">PDF</subfield><subfield code="9">978-1-4665-1797-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466517972</subfield><subfield code="c">PDF</subfield><subfield code="9">1-4665-1797-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048583421</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048583421</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466517974</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048583421</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trabelsi, Zouheir</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Attacks and Defenses</subfield><subfield code="b">a Hands-on Approach</subfield><subfield code="c">Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">Auerbach Publications</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (475 pages</subfield><subfield code="b">36 illustrations)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hayawi, Kadhim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al Braiki, Arwa</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mathew, Sujith Samuel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466517974/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-048583421
illustrated Illustrated
indexdate 2024-12-18T08:47:22Z
institution BVB
isbn 9781466517974
1466517972
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (475 pages 36 illustrations)
psigel ZDB-30-ORH
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Auerbach Publications
record_format marc
spelling Trabelsi, Zouheir VerfasserIn aut
Network Attacks and Defenses a Hands-on Approach Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
1st.
[Erscheinungsort nicht ermittelbar] Auerbach Publications 2012
1 online resource (475 pages 36 illustrations)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Computer network Security measures
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures (OCoLC)fst00872341
Hayawi, Kadhim VerfasserIn aut
Al Braiki, Arwa VerfasserIn aut
Mathew, Sujith Samuel VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781466517974/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Trabelsi, Zouheir
Hayawi, Kadhim
Al Braiki, Arwa
Mathew, Sujith Samuel
Network Attacks and Defenses a Hands-on Approach
Computer network Security measures
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures (OCoLC)fst00872341
subject_GND (OCoLC)fst00872341
title Network Attacks and Defenses a Hands-on Approach
title_auth Network Attacks and Defenses a Hands-on Approach
title_exact_search Network Attacks and Defenses a Hands-on Approach
title_full Network Attacks and Defenses a Hands-on Approach Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
title_fullStr Network Attacks and Defenses a Hands-on Approach Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
title_full_unstemmed Network Attacks and Defenses a Hands-on Approach Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
title_short Network Attacks and Defenses
title_sort network attacks and defenses a hands on approach
title_sub a Hands-on Approach
topic Computer network Security measures
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures (OCoLC)fst00872341
topic_facet Computer network Security measures
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781466517974/?ar
work_keys_str_mv AT trabelsizouheir networkattacksanddefensesahandsonapproach
AT hayawikadhim networkattacksanddefensesahandsonapproach
AT albraikiarwa networkattacksanddefensesahandsonapproach
AT mathewsujithsamuel networkattacksanddefensesahandsonapproach