Computer security and penetration testing / (Record no. 7053)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01275cam a2200277Ia 4500 |
001 - CONTROL NUMBER | |
control field | 148759915 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | APU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160127051504.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 070125s2008 maua b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781418048266 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1418048267 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)148759915 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BTCTA |
Transcribing agency | BTCTA |
Modifying agency | SUMAN |
-- | ANA |
Language of cataloging | eng |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
Item number | .B37 2008 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 21 |
Classification number | 005.8 |
Item number | BAS 2008 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Basta, Alfred. |
9 (RLIN) | 12955 |
245 10 - TITLE STATEMENT | |
Title | Computer security and penetration testing / |
Statement of responsibility, etc | Alfred Basta and Wolf Halton. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boston : |
Name of publisher, distributor, etc | Thomson, |
Date of publication, distribution, etc | c2008. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 414 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Includes Index. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- Linux vulnerabilities -- Incident handling. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 77 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Halton, Wolf. |
9 (RLIN) | 12956 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Book |
Koha issues (borrowed), all copies | 9 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Use restrictions | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Invoice number | Cost, normal purchase price | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Copy number | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not Withdrawn | Available | Not Damaged | No use restrictions | Available for loan | Book | APU Library | APU Library | Open Shelf | 18/08/2013 | IBS Buku | 58694 / B | 58694 / B | 136.10 | 15 | 22 | TK5105.59 .B37 2008 c.1 | 00007093 | 29/05/2017 | 25/04/2017 | 1 | 136.10 | 18/08/2013 | General Circulation |