MARC details
| 000 -LEADER |
| fixed length control field |
02853cam a22004337a 4500 |
| 001 - CONTROL NUMBER |
| control field |
17544067 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20190721120233.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
121129s2014 maua b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2012419871 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781284031713 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780763791834 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0763791830 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocn650217960 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
BTCTA |
| Language of cataloging |
eng |
| Transcribing agency |
BTCTA |
| Modifying agency |
YDXCP |
| -- |
BWX |
| -- |
AHS |
| -- |
GUL |
| -- |
UPM |
| -- |
DLC |
| Description conventions |
rda |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Edition number |
22 |
| Classification number |
005.8 |
| Item number |
O.S.H |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Oriyano, Sean-Philip |
| 9 (RLIN) |
33437 |
| 245 10 - TITLE STATEMENT |
| Title |
Hacker techniques, tools, and incident handling / |
| Statement of responsibility, etc |
Sean-Philip Oriyano and Michael Gregg. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Second edition |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Burlington, MA : |
| Name of publisher, distributor, etc |
Jones & Bartlett Learning, |
| Date of publication, distribution, etc |
[2014] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
©2014 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xvii, 417 pages : |
| Other physical details |
illustrations (black and white) ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 490 1# - SERIES STATEMENT |
| Series statement |
Information systems security & assurance series |
| 500 ## - GENERAL NOTE |
| General note |
computer bookfair2015 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical referencesand index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Ch1 :The Evolution of Hacking -- Ch2 : TCP/IP Review -- Ch3: Cryptographic Concepts -- Ch 4 : Physical Security -- Ch5 : Footprinting the Environment -- Ch6 : Scanning the Environment and Network -- Ch7 : System Enumeration and System Hacking -- Ch8 : Wireless Vulnerabilitie s -- Ch9 : Web Applications and Cloud Technologies -- Ch10 : Malware -- Ch11 : Sniffers, Session Hijacking, and Denial of Service -- Ch12 : Backtrack R3 -- Ch13 : Social Engineering -- Ch14 : Incident Response -- Ch15 : Defensive Technologies <br/> |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
This book begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, this second edition provides readers with a clear, comprehensive introduction to the many threats on the Internet environment and security, and what can be done to combat them. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Hackers. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Gregg, Michael |
| Fuller form of name |
(Michael C.) |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Jones & Bartlett Learning information systems security & assurance series. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
2 |
| e |
ncip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |