opac-header

Hacking exposed 6 : (Record no. 2626)

000 -LEADER
fixed length control field 02911cam a22004817a 4500
001 - CONTROL NUMBER
control field 15991611
003 - CONTROL NUMBER IDENTIFIER
control field CATC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251125164301.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 091120s2009 nyua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009517741
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA8D3471
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 014836258
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071613743
Qualifying information pbk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071613749
Qualifying information pbk.
035 ## - SYSTEM CONTROL NUMBER
System control number 15991611
040 ## - CATALOGING SOURCE
Original cataloging agency UKM
Transcribing agency Computer Arts & Technological College, Inc.
Modifying agency BWX
-- BTCTA
-- BAKER
-- YDXCP
-- QBX
-- VP@
-- IBI
-- CQU
-- SGB
-- DLC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 M11h 2009
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name McClure, Stuart
245 10 - TITLE STATEMENT
Title Hacking exposed 6 :
Remainder of title network security secrets & solutions /
Statement of responsibility, etc. by Stuart McClure ; Joel Scambray ; George Kurtz.
246 14 - VARYING FORM OF TITLE
Title proper/short title Hacking 6 exposed
246 3# - VARYING FORM OF TITLE
Title proper/short title Hacking exposed six
250 ## - EDITION STATEMENT
Edition statement 10th anniversary ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw-Hill ,
Date of publication, distribution, etc. 2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxvii , 687 pp. :
Other physical details ill. ;
Dimensions 23 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes appendices and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks.
520 ## - SUMMARY, ETC.
Summary, etc. "The phrase 'information security' has expanded significantly in scope over the last decade. The term now extends beyond protecting the secrets of major corporations and governments to include the average consumer. Our most sensitive information is stored online in vast quantities. The temptations for those who have the tools to dip an illicit, electronic spoon into the pool of confidential data are far too enticing to be ignored. Furthermore, cybercriminals are not scared of the laws that are currently in place.<br/><br/>This volume of 'Hacking Exposed' contains the newest lessons learned about the threat landscape. Its goal is education: a paramount element in the continual fight against cybercrime. This book aims to educate those with the technical expertise to defend our nations, our educational institutions, our banks, our retailers, our utilities, our infrastructures, and our families."
546 ## - LANGUAGE NOTE
Language note English.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Scambray, Joel.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kurtz, George.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
          CAT College, Inc. - ANNEX 2 Library CAT College, Inc. - ANNEX 2 Library Circulation Section 11/25/2025 CL1295   005.8 M11h 2009 CL1295 11/25/2025 11/25/2025 Books