Normal görünüm
MARC görünümü
- Penetration testing (Computer security)
Giriş Topical Term
001 - CONTROL NUMBER
- control field: 33236
003 - CONTROL NUMBER IDENTIFIER
- control field: OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
- control field: 20150210105733.0
008 - FIXED-LENGTH DATA ELEMENTS
- fixed length control field: 110620|| anannbabn |a ana
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
- LC control number: sh2011003137
040 ## - CATALOGING SOURCE
- Original cataloging agency: DLC
- Language of cataloging: eng
- Transcribing agency: DLC
150 ## - HEADING--TOPICAL TERM
- Topical term or geographic name entry element: Penetration testing (Computer security)
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Penetrasyon testleri (Bilgisayar güvenliği)
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Ethical hacking (Computer security)
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer security
- Control subfield: g
670 ## - SOURCE DATA FOUND
- Source citation: Work cat.: 2011025807: Penetration tester's open source toolkit, 2011.
670 ## - SOURCE DATA FOUND
- Source citation: McGraw-Hill Dict. of Sci. and Tech. Terms, 2003
- Information found: (Penetration testing: an activity that is intended to determine if there is a way to cause a computer program to fail to perform in the expected manner; it involves hypothsizing flaws that would prevent the program from enforcing security, and conducting experiments to confirm or refute hypothesized flaws)
670 ## - SOURCE DATA FOUND
- Source citation: Wikipedia, viewed June 20, 2011
- Information found: (Penetration test; occasionally: Pentest; evaluating the security of a computer system or network by simulating an attack from a malicious source)
670 ## - SOURCE DATA FOUND
- Source citation: CEH prep guide : the comprehensive guide to certified ethical hacking, 2008.
-baunlogo.png?alt=media&token=2b1f50b7-298a-48ee-a2b1-6fcf8e70b387)