Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Hacker techniques, tools, and incident handling / (Record no. 9351)

MARC details
000 -LEADER
fixed length control field 02853cam a22004337a 4500
001 - CONTROL NUMBER
control field 17544067
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190721120233.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121129s2014 maua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012419871
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284031713 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780763791834 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0763791830 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn650217960
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Transcribing agency BTCTA
Modifying agency YDXCP
-- BWX
-- AHS
-- GUL
-- UPM
-- DLC
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 005.8
Item number O.S.H
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Oriyano, Sean-Philip
9 (RLIN) 33437
245 10 - TITLE STATEMENT
Title Hacker techniques, tools, and incident handling /
Statement of responsibility, etc Sean-Philip Oriyano and Michael Gregg.
250 ## - EDITION STATEMENT
Edition statement Second edition
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington, MA :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc [2014]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2014
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 417 pages :
Other physical details illustrations (black and white) ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
490 1# - SERIES STATEMENT
Series statement Information systems security & assurance series
500 ## - GENERAL NOTE
General note computer bookfair2015
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical referencesand index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Ch1 :The Evolution of Hacking -- Ch2 : TCP/IP Review -- Ch3: Cryptographic Concepts -- Ch 4 : Physical Security -- Ch5 : Footprinting the Environment -- Ch6 : Scanning the Environment and Network -- Ch7 : System Enumeration and System Hacking -- Ch8 : Wireless Vulnerabilitie s -- Ch9 : Web Applications and Cloud Technologies -- Ch10 : Malware -- Ch11 : Sniffers, Session Hijacking, and Denial of Service -- Ch12 : Backtrack R3 -- Ch13 : Social Engineering -- Ch14 : Incident Response -- Ch15 : Defensive Technologies <br/>
520 ## - SUMMARY, ETC.
Summary, etc This book begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, this second edition provides readers with a clear, comprehensive introduction to the many threats on the Internet environment and security, and what can be done to combat them.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hackers.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gregg, Michael
Fuller form of name (Michael C.)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Jones & Bartlett Learning information systems security & assurance series.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Date checked out Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 22/02/2015 Sphinx publishing 436.00 Purchase 2 005.8 O.S.H 00012252 19/02/2025 17/10/2019 22/02/2015 Books