Optimization for Learning and Control / (Record no. 7814)

MARC details
000 -LEADER
fixed length control field 02019cam a22002898i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260226125459.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230124s2023 nju o 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119577485
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119577485
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.210151
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Hansson, Anders
245 10 - TITLE STATEMENT
Title Optimization for Learning and Control /
Statement of responsibility, etc Anders Hansson and Martin Andersen
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication NewJersey:
Name of publisher WILEY,
Year of publication ©2023
300 ## - PHYSICAL DESCRIPTION
Number of Pages 259p.
500 ## - GENERAL NOTE
General note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Contact to Central Library: library@iittp.ac.in
520 ## - SUMMARY, ETC.
Summary, etc Target, test, analyze, and report on security vulnerabilities with pen testing<br/><br/>Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. <br/><br/>Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.<br/><br/>The different phases of a pen test from pre-engagement to completion<br/>Threat modeling and understanding risk<br/>When to apply vulnerability management vs penetration testing<br/>Ways to keep your pen testing skills sharp, relevant, and at the top of the game<br/> <br/><br/>Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term System analysis
General subdivision Mathematics
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Mathematical optimization
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Machine learning
General subdivision Mathematics
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Signal processing
General subdivision Mathematics
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Andersen, Martin S.,
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10132902
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Full call number Accession Number Bill Date/Price effective from Koha item type
      Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 23/12/2025 004.2/10151 EB00778 23/12/2025 E-Books