| 000 -LEADER |
| fixed length control field |
02911cam a22004817a 4500 |
| 001 - CONTROL NUMBER |
| control field |
15991611 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CATC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20251125164301.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
091120s2009 nyua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2009517741 |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBA8D3471 |
| Source |
bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
014836258 |
| Source |
Uk |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780071613743 |
| Qualifying information |
pbk. |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0071613749 |
| Qualifying information |
pbk. |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
15991611 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UKM |
| Transcribing agency |
Computer Arts & Technological College, Inc. |
| Modifying agency |
BWX |
| -- |
BTCTA |
| -- |
BAKER |
| -- |
YDXCP |
| -- |
QBX |
| -- |
VP@ |
| -- |
IBI |
| -- |
CQU |
| -- |
SGB |
| -- |
DLC |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
English |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 M11h 2009 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
McClure, Stuart |
| 245 10 - TITLE STATEMENT |
| Title |
Hacking exposed 6 : |
| Remainder of title |
network security secrets & solutions / |
| Statement of responsibility, etc. |
by Stuart McClure ; Joel Scambray ; George Kurtz. |
| 246 14 - VARYING FORM OF TITLE |
| Title proper/short title |
Hacking 6 exposed |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
Hacking exposed six |
| 250 ## - EDITION STATEMENT |
| Edition statement |
10th anniversary ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
New York : |
| Name of publisher, distributor, etc. |
McGraw-Hill , |
| Date of publication, distribution, etc. |
2009. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxvii , 687 pp. : |
| Other physical details |
ill. ; |
| Dimensions |
23 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes appendices and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Casing the establishment. Footprinting -- Scanning -- Enumeration -- System hacking. Hacking Windows -- Hacking Unix -- Infrastructure hacking. Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Hacking hardware -- Application and data hacking. Hacking code -- Web hacking -- Hacking the internet user -- Appendices: Ports ; Top 14 security vulnerabilities ; Denial of service (DoS) and distributed denial of service (DDoS) attacks. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"The phrase 'information security' has expanded significantly in scope over the last decade. The term now extends beyond protecting the secrets of major corporations and governments to include the average consumer. Our most sensitive information is stored online in vast quantities. The temptations for those who have the tools to dip an illicit, electronic spoon into the pool of confidential data are far too enticing to be ignored. Furthermore, cybercriminals are not scared of the laws that are currently in place.<br/><br/>This volume of 'Hacking Exposed' contains the newest lessons learned about the threat landscape. Its goal is education: a paramount element in the continual fight against cybercrime. This book aims to educate those with the technical expertise to defend our nations, our educational institutions, our banks, our retailers, our utilities, our infrastructures, and our families." |
| 546 ## - LANGUAGE NOTE |
| Language note |
English. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Scambray, Joel. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kurtz, George. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
2 |
| e |
ncip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
|
| Koha item type |
Books |
| Suppress in OPAC |
No |