MARC details
000 -LEADER |
fixed length control field |
01862nam a2200373 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CSPC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240812153021.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230327s2020 ph a bi 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284147803 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
CSPC |
Original cataloging agency |
CSPC |
Language of cataloging |
eng |
Description conventions |
rda |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
Or49h |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Oriyano, Sean-Philip, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Hacker techniques, tools, and incident handling / |
Statement of responsibility, etc. |
Sean-Philip Oriyano and Michael G. Solomon. |
250 ## - EDITION STATEMENT |
Edition statement |
Third edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Burlington, Massachusetts : |
Name of publisher, distributor, etc. |
Jones and Barlett Learning, |
Date of publication, distribution, etc. |
2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 407 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part I Hacker techniques and tools -- Hacking: the next generation -- TCP/IP review -- Cryptographic concepts -- Physical security -- Part II A technical and social overview of hacking -- Footprinting tools and techniques -- Port scanning -- Enumeration and computer system hacking -- Wireless vulnerabilities -- Web and database attacks -- Malware -- Sniffers, session hijacking, and denial of service attacks -- Linux and penetration testing -- Social engineering -- Part III Incident response and defensive technologies -- Incident response -- Defensive technologies. |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
Form subdivision |
Security measures. |
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Solomon, Michael G., |
Relator term |
author. |
940 ## - EQUIVALENCE OR CROSS-REFERENCE--UNIFORM TITLE [OBSOLETE] [CAN/MARC only] |
Uniform title |
<a href="jessa f">jessa f</a> |
940 ## - EQUIVALENCE OR CROSS-REFERENCE--UNIFORM TITLE [OBSOLETE] [CAN/MARC only] |
Uniform title |
<a href="mae">mae</a> |
940 ## - EQUIVALENCE OR CROSS-REFERENCE--UNIFORM TITLE [OBSOLETE] [CAN/MARC only] |
Uniform title |
<a href="arly">arly</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Classification part |
005.8 |
Call number prefix |
CIR |
Call number suffix |
2020 |
Item part |
Or49h |
Suppress in OPAC |
No |