Hacking exposed : (Record no. 2621)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080327s2005 caua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2006530763
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780072260816
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u364
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name McClure, Stuart.
9 (RLIN) 7130
245 10 - TITLE STATEMENT
Title Hacking exposed :
Remainder of title network security secrets & solutions /
Statement of responsibility, etc. Stuart McClure, Joel Scambray, George Kurtz.
246 30 - VARYING FORM OF TITLE
Title proper/short title Network security secrets & solutions
246 3# - VARYING FORM OF TITLE
Title proper/short title Network security secrets and solutions
250 ## - EDITION STATEMENT
Edition statement 5th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Emeryville, Calif. :
Name of publisher, distributor, etc. McGraw-Hill/Osborne,
Date of publication, distribution, etc. 2005.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 692 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Previous ed.: 2003.
500 ## - GENERAL NOTE
General note Previous ed.: 2003.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Case study : Googling your way to insecurity -- Footprinting -- Footprintin -- Scanning -- Enumeration -- Hacking Window -- Hacking UNIX -- Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Firewalls -- Denial of service attacks -- Hacking code -- Web hacking -- Hacking the Internet user.
520 ## - SUMMARY, ETC.
Summary, etc. Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes: Code hacking methods and countermeasures New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications Latest DDoS techniques--zombies, Blaster, MyDoom All new class of vulnerabilities--HTTP Response Splitting.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Microsoft Windows (Computer file)
9 (RLIN) 324
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 7131
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 7132
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7133
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Scambray, Joel.
9 (RLIN) 7134
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kurtz, George.
9 (RLIN) 1907
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Date last checked out
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.8 / MC.H 2005 000354 11/24/2019 1 11/24/2019 Books  
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE 1 005.8 / MC.H 2005 000631 09/25/2025 2 11/24/2019 Books 09/25/2025