Balıkesir Üniversitesi
Kütüphane ve Dokümantasyon Daire Başkanlığı
Normal görünüm MARC görünümü
  • Penetration testing (Computer security)

Giriş Topical Term

Kullanılan kayıt sayısı: 1

001 - CONTROL NUMBER

  • control field: 33236

003 - CONTROL NUMBER IDENTIFIER

  • control field: OCoLC

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20150210105733.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 110620|| anannbabn |a ana

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh2011003137

040 ## - CATALOGING SOURCE

  • Original cataloging agency: DLC
  • Language of cataloging: eng
  • Transcribing agency: DLC

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Penetration testing (Computer security)

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Penetrasyon testleri (Bilgisayar güvenliği)

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Ethical hacking (Computer security)

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer security
  • Control subfield: g

670 ## - SOURCE DATA FOUND

  • Source citation: Work cat.: 2011025807: Penetration tester's open source toolkit, 2011.

670 ## - SOURCE DATA FOUND

  • Source citation: McGraw-Hill Dict. of Sci. and Tech. Terms, 2003
  • Information found: (Penetration testing: an activity that is intended to determine if there is a way to cause a computer program to fail to perform in the expected manner; it involves hypothsizing flaws that would prevent the program from enforcing security, and conducting experiments to confirm or refute hypothesized flaws)

670 ## - SOURCE DATA FOUND

  • Source citation: Wikipedia, viewed June 20, 2011
  • Information found: (Penetration test; occasionally: Pentest; evaluating the security of a computer system or network by simulating an attack from a malicious source)

670 ## - SOURCE DATA FOUND

  • Source citation: CEH prep guide : the comprehensive guide to certified ethical hacking, 2008.
Bizi Sosyal Medyada Takip Edin