Hacking Exposed 6 : (Record no. 12094)

MARC details
000 -LEADER
fixed length control field 01515cam a22003137a 4500
001 - CONTROL NUMBER
control field 15991611
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250902212902.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 091120s2009 nyua 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071613743 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071613749 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency UKM
Modifying agency BWX
-- BTCTA
-- BAKER
-- YDXCP
-- QBX
-- VP@
-- IBI
-- CQU
-- SGB
-- DLC
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number McC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name McClure, Stuart.
9 (RLIN) 1777
245 10 - TITLE STATEMENT
Title Hacking Exposed 6 :
Remainder of title network security secrets & solutions /
Statement of responsibility, etc Stuart McClure, Joel Scambray, George Kurtz.
246 14 - VARYING FORM OF TITLE
Title proper/short title Hacking 6 exposed
246 3# - VARYING FORM OF TITLE
Title proper/short title Hacking exposed six
250 ## - EDITION STATEMENT
Edition statement 10th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc McGraw-Hill,
Date of publication, distribution, etc c2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxvii, 687 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 1779
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 1781
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
9 (RLIN) 1783
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Scambray, Joel.
9 (RLIN) 1785
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kurtz, George.
9 (RLIN) 1787
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Koha issues (borrowed), all copies 4
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Date checked out Price effective from Koha item type
    Dewey Decimal Classification     Hamu Mukasa Library Hamu Mukasa Library - Law and Science section; Level 3 Closed Access l Short Loan 05.11.2010 4 005.8 MCC 99830 07.10.2025 02.09.2025 05.11.2010 Books