Search

Principle Ethical Hacking & Considerations

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20210015427</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20211228174952.0</controlfield>
    <controlfield tag="008">210601e20210501esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20210008047</subfield>
      <subfield code="a">Jackson, Jhon</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Principle Ethical Hacking & Considerations</subfield>
      <subfield code="c">John Jackson</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">"Ethical Hacker", is the representation of what ethical versus unethical really is. The philosophical field of ethics is complex and sometimes perception is not always the reality. In addition, someone's selfassigned ethics can be conflicting and biased. A lot of the issues within hacking culture are resultant of intention, and various restrictions on all ends of the hacking spectrum - especially as it pertains to the acquisition of knowledge.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080544119</subfield>
      <subfield code="a">Hackers</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080538668</subfield>
      <subfield code="a">Ética</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000383</subfield>
      <subfield code="t">Actuarios</subfield>
      <subfield code="d">Madrid : Instituto de Actuarios Españoles, 1990-</subfield>
      <subfield code="g">01/05/2021 Número 48 - mayo 2021 , p. 28-29</subfield>
    </datafield>
    <datafield tag="856" ind1=" " ind2=" ">
      <subfield code="q">application/pdf</subfield>
      <subfield code="w">1111212</subfield>
      <subfield code="y">Recurso electrónico / Electronic resource</subfield>
    </datafield>
  </record>
</collection>