000 -LEADER |
fixed length control field |
02519nam a2200301 4500 |
001 - CONTROL NUMBER |
control field |
vtls001873660 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200226121318.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218 00 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0072127481 |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201706141110 |
Level of effort used to assign nonsubject heading access points |
ummi |
Level of effort used to assign subject headings |
201102181734 |
Level of effort used to assign classification |
VLOAD |
-- |
200407271914 |
-- |
VLOAD |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
SCA |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Scambray, Joel |
9 (RLIN) |
11167 |
245 10 - TITLE STATEMENT |
Title |
Hacking exposed : |
Remainder of title |
network security secrets & solutions / |
Statement of responsibility, etc. |
Joel Scambray, Stuart McClure, George Kurtz |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Berkeley, Calif. : |
Name of publisher, distributor, etc. |
Osborne/McGraw-Hill, |
Date of publication, distribution, etc. |
c2001 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxix, 703 p. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
McClure's name appears first on the previous edition |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword. - Acknowledgments. - Introduction. - Pt. 1. Casing the Establishment. Case Study: Target Acquisition. 1. Footprinting. 2. Scanning. 3. Enumeration. - Pt. II. System Hacking. Case Study: Know Your Enemy. 4. Hacking Windows 95/98 and ME. 5. Hacking Windows NT. 6. Hacking Windows 2000. 7. Novell NetWare Hacking. 8. Hacking UNIX. - Pt. III. Case Study: Sweat the Small Stuff! 9. Dial-Up, PBX, Voicemail, and VPN Hacking. 10. Network Devices. 11. Firewalls. 12. Denial of Service (DoS) Attacks. - Pt. 1V. Software Hacking. Case Study: Using All the Dirty Tricks to Get In. 13. Remote Control Insecurities. 14. Advanced Techniques. 15. Web Hacking. 16. Hacking the Internet User. - Pt. V. Appendixes. A. Ports. B. Top 14. Security Vulnerabilities. C: About the Companion Web Site. - Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more depth insight into how hackers infiltrate e-business and how they can be stopped. Security insiders Joel Scambray, Stuart McClure, and George Kurtz present more than 220 all-new pages of technical detail and case studies in an easy-to-follow style. The world of internet security moves faster than the digital economy, and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here. Use the real-world counter measures in this one-of-a-kind volume to plug the holes in your network today- before they end up in the headlines tomorrow." - Back cover. |
590 ## - LOCAL NOTE (RLIN) |
Local note |
Computer programming, programs & data |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
9098 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
7460 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kurtz, George. |
Relator term |
(j.a.) |
9 (RLIN) |
9835 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
McClure, Stuart |
Relator term |
(j.a.) |
9 (RLIN) |
9834 |
920 ## - Programme |
Programme |
ADP : 93654 |
921 ## - Programme |
Programme |
GEN : 102722 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
180604 |
Koha biblioitemnumber |
180604 |