Hacking Exposed 6 : (Record no. 12093)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01581cam a22003377a 4500 |
| 001 - CONTROL NUMBER | |
| control field | 15991611 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20091120114613.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 091120s2009 nyua 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780071613743 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0071613749 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)ocn276647529 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | UKM |
| Transcribing agency | UKM |
| Modifying agency | BWX |
| -- | BTCTA |
| -- | BAKER |
| -- | YDXCP |
| -- | QBX |
| -- | VP@ |
| -- | IBI |
| -- | CQU |
| -- | SGB |
| -- | DLC |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | lccopycat |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | McClure, Stuart. |
| 9 (RLIN) | 1777 |
| 245 10 - TITLE STATEMENT | |
| Title | Hacking Exposed 6 : |
| Remainder of title | network security secrets & solutions / |
| Statement of responsibility, etc | Stuart McClure, Joel Scambray, George Kurtz. |
| 246 14 - VARYING FORM OF TITLE | |
| Title proper/short title | Hacking 6 exposed |
| 246 3# - VARYING FORM OF TITLE | |
| Title proper/short title | Hacking exposed six |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 10th anniversary ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | New York : |
| Name of publisher, distributor, etc | McGraw-Hill, |
| Date of publication, distribution, etc | c2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxvii, 687 p. : |
| Other physical details | ill. ; |
| Dimensions | 23 cm. |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 1778 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security. |
| 9 (RLIN) | 1780 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection. |
| 9 (RLIN) | 1782 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Scambray, Joel. |
| 9 (RLIN) | 1784 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Kurtz, George. |
| 9 (RLIN) | 1786 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Books |
No items available.