Hacking Exposed 6 : (Record no. 12093)

MARC details
000 -LEADER
fixed length control field 01581cam a22003377a 4500
001 - CONTROL NUMBER
control field 15991611
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20091120114613.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 091120s2009 nyua 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071613743 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071613749 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn276647529
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency UKM
Modifying agency BWX
-- BTCTA
-- BAKER
-- YDXCP
-- QBX
-- VP@
-- IBI
-- CQU
-- SGB
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name McClure, Stuart.
9 (RLIN) 1777
245 10 - TITLE STATEMENT
Title Hacking Exposed 6 :
Remainder of title network security secrets & solutions /
Statement of responsibility, etc Stuart McClure, Joel Scambray, George Kurtz.
246 14 - VARYING FORM OF TITLE
Title proper/short title Hacking 6 exposed
246 3# - VARYING FORM OF TITLE
Title proper/short title Hacking exposed six
250 ## - EDITION STATEMENT
Edition statement 10th anniversary ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc McGraw-Hill,
Date of publication, distribution, etc c2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxvii, 687 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 1778
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 1780
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
9 (RLIN) 1782
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Scambray, Joel.
9 (RLIN) 1784
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kurtz, George.
9 (RLIN) 1786
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books

No items available.