Statements (62)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:book
|
gptkbp:author |
gptkb:Stuart_Mc_Clure
gptkb:George_Kurtz William Arbaugh |
gptkbp:country |
gptkb:United_States
|
gptkbp:focus |
gptkb:Company
gptkb:software gptkb:currency Data protection Risk management Malware analysis Incident response Penetration testing Security vulnerabilities Vulnerability assessment Cloud security Network security Security best practices Security policies Security audits Mobile security Security monitoring Security threats Security incidents Incident management Digital forensics Security operations Security compliance Security frameworks Security breaches Security assessments Social engineering Security tools Threat modeling Web security Application security Security policies and procedures Security awareness training Security certifications Security metrics Ethical hacking Security governance Wireless security Security intelligence Io T security Security incidents response |
gptkbp:format |
gptkb:printer
gptkb:book |
gptkbp:genre |
gptkb:Author
|
https://www.w3.org/2000/01/rdf-schema#label |
Hacking Exposed
|
gptkbp:isbn |
0072132848
|
gptkbp:language |
English
|
gptkbp:next_edition |
3rd edition
|
gptkbp:page_count |
gptkb:television_series
|
gptkbp:published_year |
gptkb:1999
|
gptkbp:publisher |
gptkb:Mc_Graw-Hill
|
gptkbp:series |
Hacking Exposed Series
|
gptkbp:subject |
Information technology
Computer security Hacking |
gptkbp:bfsParent |
gptkb:Stuart_Mc_Clure
|
gptkbp:bfsLayer |
5
|