Hacking Exposed 6 : (Record no. 12094)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01515cam a22003137a 4500 |
001 - CONTROL NUMBER | |
control field | 15991611 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250902212902.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 091120s2009 nyua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071613743 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0071613749 (pbk.) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | UKM |
Transcribing agency | UKM |
Modifying agency | BWX |
-- | BTCTA |
-- | BAKER |
-- | YDXCP |
-- | QBX |
-- | VP@ |
-- | IBI |
-- | CQU |
-- | SGB |
-- | DLC |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | McC |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | McClure, Stuart. |
9 (RLIN) | 1777 |
245 10 - TITLE STATEMENT | |
Title | Hacking Exposed 6 : |
Remainder of title | network security secrets & solutions / |
Statement of responsibility, etc | Stuart McClure, Joel Scambray, George Kurtz. |
246 14 - VARYING FORM OF TITLE | |
Title proper/short title | Hacking 6 exposed |
246 3# - VARYING FORM OF TITLE | |
Title proper/short title | Hacking exposed six |
250 ## - EDITION STATEMENT | |
Edition statement | 10th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New York : |
Name of publisher, distributor, etc | McGraw-Hill, |
Date of publication, distribution, etc | c2009. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvii, 687 p. : |
Other physical details | ill. ; |
Dimensions | 23 cm. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 1779 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
9 (RLIN) | 1781 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
9 (RLIN) | 1783 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Scambray, Joel. |
9 (RLIN) | 1785 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kurtz, George. |
9 (RLIN) | 1787 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Koha issues (borrowed), all copies | 4 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Date checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Hamu Mukasa Library | Hamu Mukasa Library - Law and Science section; Level 3 | Closed Access l Short Loan | 05.11.2010 | 4 | 005.8 MCC | 99830 | 07.10.2025 | 02.09.2025 | 05.11.2010 | Books |