Hacking: the next generation ; [bringing the attack to your network]
Main Author: | |
---|---|
Contributors: | ; |
Format: | Print Book |
Language: | English |
Published: |
Beijing Köln [u.a.]
O'Reilly
2009
|
In: | Year: 2009 |
Edition: | 1st ed. |
Online Access: |
Cover Inhaltstext (Verlag) Table of Contents |
Availability in Tübingen: | Present in Tübingen. UB: KB 20 A 4496 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 602553571 | ||
003 | DE-627 | ||
005 | 20230118234831.0 | ||
007 | tu | ||
008 | 090624s2009 cc ||||| 00| ||eng c | ||
010 | |a 2010484033 | ||
015 | |a 09,N27,0012 |2 dnb | ||
015 | |a 99,478,2691 |2 dnb | ||
016 | 7 | |a 994782691 |2 DE-101 | |
020 | |a 9780596154578 |c PB. : EUR 38.00 (freier Pr.) |9 978-0-596-15457-8 | ||
024 | 3 | |a 9780596154578 | |
035 | |a (DE-627)602553571 | ||
035 | |a (DE-576)311496636 | ||
035 | |a (DE-599)DNB994782691 | ||
035 | |a (OCoLC)845552442 | ||
035 | |a (OCoLC)611190240 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XB-CN |c XD-US |c XA-GB | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/4 |q LOC |2 22 | |
082 | 0 | |a 004 |q OCLC | |
082 | 0 | |a 005.8 | |
082 | 0 | 4 | |a 004 |
084 | |a ST 277 |2 rvk |0 (DE-625)rvk/143643: | ||
084 | |a 54.38 |2 bkl | ||
084 | |a 54.32 |2 bkl | ||
100 | 1 | |a Dhanjani, Nitesh |4 aut | |
245 | 1 | 0 | |a Hacking |b the next generation ; [bringing the attack to your network] |c Nitesh Dhanjani; Billy Rios, and Brett Hardin |
250 | |a 1st ed. | ||
264 | 1 | |a Beijing |a Köln [u.a.] |b O'Reilly |c 2009 | |
300 | |a XIII, 279 S. |b Ill., graph. Darst. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Internet |x Security measures | |
689 | 0 | 0 | |d s |0 (DE-588)4113821-1 |0 (DE-627)105826642 |0 (DE-576)209479604 |a Hacker |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4070085-9 |0 (DE-627)104131403 |0 (DE-576)209179252 |a Rechnernetz |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4011144-1 |0 (DE-627)106354191 |0 (DE-576)208892001 |a Datensicherung |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4274324-2 |0 (DE-627)104467525 |0 (DE-576)21070585X |a Computersicherheit |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Rios, Billy |4 aut | |
700 | 1 | |a Hardin, Brett |4 aut | |
856 | 4 | 2 | |u http://deposit.d-nb.de/cgi-bin/dokserv?id=3321497&prov=M&dok_var=1&dok_ext=htm |q text/html |x Verlag |3 Inhaltstext |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz311496636cov.jpg |m V:DE-576 |m X:oReilly |q image/jpeg |v 20091008173234 |3 Cover |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz311496636inh.htm |m V:DE-576;B:DE-21 |q application/pdf |v 20100816093640 |3 Inhaltsverzeichnis |
935 | |i Blocktest | ||
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
936 | b | k | |a 54.38 |j Computersicherheit |0 (DE-627)106418866 |
936 | b | k | |a 54.32 |j Rechnerkommunikation |0 (DE-627)10640623X |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3245661428 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 602553571 | ||
LOK | |0 005 20100805114811 | ||
LOK | |0 008 100615||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 4496 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 936ln |a k4.7.5 | ||
LOK | |0 938 |a 1008 |f 34 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 4496 |