1.

Record Nr.

UNINA9910793934903321

Autore

Plank Christiane

Titolo

"Weitere Infos unter..." : zur Qualität crossmedialer Verweise in ausgewählten Tages- und Wochenzeitungen sowie Publikumszeitschriften / / Christiane A. Plank

Pubbl/distr/stampa

Berlin : , : Logos Verlag, , [2016]

©2016

ISBN

3-8325-8814-0

Descrizione fisica

1 online resource (357 pages)

Disciplina

070.4

Soggetti

Press

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

PublicationDate: 20160815

Sommario/riassunto

Long description: Der Buchtitel Weitere Infos unter...  steht exemplarisch für den Forschungsgegenstand der Dissertation von Christiane A. Plank. Die vertraute Formulierung flankiert meist crossmediale Verweise, um Rezipienten zum Wechsel auf den Inhalt eines anderen Mediums zu motivieren.  Zu Beginn stellt die Autorin eine in Anlehnung an die terminologische Analyse entwickelte Definition crossmedialer Verweise vor - mit Fokus auf den Terminus Crossmedia. Doch nicht jeder crossmediale Verweis in einer journalistischen Produktion besitzt dieselbe Qualität. Unter Berücksichtigung ausgewählter Kriterien aus dem Qualitätsjournalismus wird mit einem Mehrmethodendesign ein Vorschlag zur differenzierten Bewertung erarbeitet und überprüft. Die Zusammenstellung geeigneter Items erfolgt auf Basis einer qualitativen Inhaltsanalyse. Eine quantitative Erhebung dient der Durchführung von Häufigkeitsanalysen.  Die Studie beinhaltet den Entwurf einer Typologie crossmedialer Verweise. Es wird deutlich, welche ungeahnten Möglichkeiten in der Verwendung unterschiedlicher Formen von crossmedialen Verweisen für den praktischen Journalismus liegen. Zugleich zeigt das Ergebnis der Untersuchung ein hohes Potenzial zur Optimierung der Qualität auf.



2.

Record Nr.

UNINA9910793040303321

Autore

Sabih Zaid

Titolo

Learn ethical hacking from scratch : your stepping stone to penetration testing / / Zaid Sabih

Pubbl/distr/stampa

Birmingham, England : , : Packt, , 2018

ISBN

1-78862-478-5

Edizione

[1st edition]

Descrizione fisica

1 online resource (549 pages)

Disciplina

005.8092

Soggetti

Penetration testing (Computer security)

Hacking

Computer networks - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Sommario/riassunto

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure



systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is for Learning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts. Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.