skip to content
Netzwerkprotokolle hacken : Sicherheitslücken verstehen, analysieren und schützen Preview this item
ClosePreview this item
Checking...

Netzwerkprotokolle hacken : Sicherheitslücken verstehen, analysieren und schützen

Author: James Forshaw; Peter Klicman; Dpunkt.Verlag (Heidelberg)
Publisher: Heidelberg dpunkt.Verlag 2018
Edition/Format:   Print book : German : 1. AuflageView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Erscheint auch als:
Online-Ausgabe, PDF
Erscheint auch als:
Online-Ausgabe, ePub
Erscheint auch als:
Online-Ausgabe, mobi
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: James Forshaw; Peter Klicman; Dpunkt.Verlag (Heidelberg)
ISBN: 9783864905698 3864905699
OCLC Number: 1043234304
Description: XXIII, 341 Seiten : Illustrationen, Diagramme ; 24 cm x 16.5 cm
Responsibility: James Forshaw.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1043234304> # Netzwerkprotokolle hacken : Sicherheitslücken verstehen, analysieren und schützen
    a schema:CreativeWork, schema:Book ;
    bgn:translationOfWork <http://www.worldcat.org/title/-/oclc/1043234304#CreativeWork/unidentifiedOriginalWork> ;
    library:oclcnum "1043234304" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/sicherheit> ; # Sicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/bug> ; # Bug
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/hunter> ; # Hunter
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/com043050> ; # COM043050
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/allgemein> ; # Allgemein
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Topic/rechnernetz> ; # Rechnernetz
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/protokollebene> ; # Protokollebene
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/bughunter> ; # Bughunter
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/com053000> ; # COM053000
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Topic/hacker> ; # Hacker
    schema:about <http://dewey.info/class/005.8/e22/ger/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/1636_hardcover_softcover_informatik_edv_datenkommunikation_netzwerke> ; # 1636: Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/paperback_softback> ; # Paperback / softback
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/unsewn_adhesive_bound> ; # )Unsewn / adhesive bound
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/kryptografie> ; # Kryptografie
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/penetration_tester_adminstratoren_entwickler> ; # - Penetration Tester - Adminstratoren - Entwickler
    schema:about <http://experiment.worldcat.org/entity/work/data/3921134738#Thing/schwachstellen> ; # Schwachstellen
    schema:author <http://experiment.worldcat.org/entity/work/data/3921134738#Person/forshaw_james> ; # James Forshaw
    schema:bookEdition "1. Auflage." ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/3921134738#Person/klicman_peter_1965> ; # Peter Klicman
    schema:datePublished "2018" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3921134738> ;
    schema:inLanguage "de" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/3921134738#CreativeWork/> ;
    schema:name "Netzwerkprotokolle hacken : Sicherheitslücken verstehen, analysieren und schützen"@de ;
    schema:productID "1043234304" ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/3921134738#Organization/dpunkt_verlag_heidelberg> ; # Dpunkt.Verlag (Heidelberg)
    schema:url <http://d-nb.info/1151525294/04> ;
    schema:workExample <http://worldcat.org/isbn/9783864905698> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1043234304> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/3921134738#Thing/1636_hardcover_softcover_informatik_edv_datenkommunikation_netzwerke> # 1636: Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke
    a schema:Thing ;
    schema:name "1636: Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Thing/paperback_softback> # Paperback / softback
    a schema:Thing ;
    schema:name "Paperback / softback" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Thing/penetration_tester_adminstratoren_entwickler> # - Penetration Tester - Adminstratoren - Entwickler
    a schema:Thing ;
    schema:name "- Penetration Tester - Adminstratoren - Entwickler" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Thing/protokollebene> # Protokollebene
    a schema:Thing ;
    schema:name "Protokollebene" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Thing/schwachstellen> # Schwachstellen
    a schema:Thing ;
    schema:name "Schwachstellen" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Thing/unsewn_adhesive_bound> # )Unsewn / adhesive bound
    a schema:Thing ;
    schema:name ")Unsewn / adhesive bound" ;
    .

<http://experiment.worldcat.org/entity/work/data/3921134738#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@de ;
    .

<http://worldcat.org/entity/work/data/3921134738#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Erscheint auch als:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1043234304> ; # Netzwerkprotokolle hacken : Sicherheitslücken verstehen, analysieren und schützen
    .

<http://worldcat.org/isbn/9783864905698>
    a schema:ProductModel ;
    schema:isbn "3864905699" ;
    schema:isbn "9783864905698" ;
    .

<http://www.worldcat.org/title/-/oclc/1043234304>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1043234304> ; # Netzwerkprotokolle hacken : Sicherheitslücken verstehen, analysieren und schützen
    schema:dateModified "2019-07-16" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.