MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
080327s2005 caua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2006530763 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780072260816 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u364 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
McClure, Stuart. |
| 9 (RLIN) |
7130 |
| 245 10 - TITLE STATEMENT |
| Title |
Hacking exposed : |
| Remainder of title |
network security secrets & solutions / |
| Statement of responsibility, etc. |
Stuart McClure, Joel Scambray, George Kurtz. |
| 246 30 - VARYING FORM OF TITLE |
| Title proper/short title |
Network security secrets & solutions |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
Network security secrets and solutions |
| 250 ## - EDITION STATEMENT |
| Edition statement |
5th ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Emeryville, Calif. : |
| Name of publisher, distributor, etc. |
McGraw-Hill/Osborne, |
| Date of publication, distribution, etc. |
2005. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiii, 692 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 500 ## - GENERAL NOTE |
| General note |
Previous ed.: 2003. |
| 500 ## - GENERAL NOTE |
| General note |
Previous ed.: 2003. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Case study : Googling your way to insecurity -- Footprinting -- Footprintin -- Scanning -- Enumeration -- Hacking Window -- Hacking UNIX -- Remote connectivity and VoIP hacking -- Network devices -- Wireless hacking -- Firewalls -- Denial of service attacks -- Hacking code -- Web hacking -- Hacking the Internet user. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes: Code hacking methods and countermeasures New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications Latest DDoS techniques--zombies, Blaster, MyDoom All new class of vulnerabilities--HTTP Response Splitting. |
| 596 ## - |
| -- |
1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Microsoft Windows (Computer file) |
| 9 (RLIN) |
324 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
CIT. |
| 9 (RLIN) |
14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
7131 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
7132 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection. |
| 9 (RLIN) |
7133 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Scambray, Joel. |
| 9 (RLIN) |
7134 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kurtz, George. |
| 9 (RLIN) |
1907 |