Optimization for Learning and Control / (Record no. 7814)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02019cam a22002898i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260226125459.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 230124s2023 nju o 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119577485 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119577485 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 004.210151 |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Hansson, Anders |
| 245 10 - TITLE STATEMENT | |
| Title | Optimization for Learning and Control / |
| Statement of responsibility, etc | Anders Hansson and Martin Andersen |
| 250 ## - EDITION STATEMENT | |
| Edition statement | First edition. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | NewJersey: |
| Name of publisher | WILEY, |
| Year of publication | ©2023 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | 259p. |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Contact to Central Library: library@iittp.ac.in |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Target, test, analyze, and report on security vulnerabilities with pen testing<br/><br/>Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. <br/><br/>Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.<br/><br/>The different phases of a pen test from pre-engagement to completion<br/>Threat modeling and understanding risk<br/>When to apply vulnerability management vs penetration testing<br/>Ways to keep your pen testing skills sharp, relevant, and at the top of the game<br/> <br/><br/>Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!<br/> |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | System analysis |
| General subdivision | Mathematics |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Mathematical optimization |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Machine learning |
| General subdivision | Mathematics |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Signal processing |
| General subdivision | Mathematics |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Andersen, Martin S., |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10132902 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 23/12/2025 | 004.2/10151 | EB00778 | 23/12/2025 | E-Books |