000 -LEADER |
fixed length control field |
01816nam a2200229 4500 |
001 - CONTROL NUMBER |
control field |
vtls002256060 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200306153852.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218s2002 njua 001 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0130332739 |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201909201142 |
Level of effort used to assign nonsubject heading access points |
ummi |
Level of effort used to assign subject headings |
201102181241 |
Level of effort used to assign classification |
VLOAD |
-- |
200407271931 |
-- |
VLOAD |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
SKO |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Skoudis, Ed. |
9 (RLIN) |
203821 |
245 10 - TITLE STATEMENT |
Title |
Counter hack : |
Remainder of title |
a step-by-step guide to computer attacks and effective defenses / |
Statement of responsibility, etc. |
Ed Skoudis |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Upper Saddle River, N.J. : |
Name of publisher, distributor, etc. |
Prentice Hall PTR, |
Date of publication, distribution, etc. |
c2002 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 564 p. : |
Other physical details |
ill. ; |
Dimensions |
23 cm. |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Prentice Hall series in computer networking and distributed systems / Radia Perlman, series editor |
9 (RLIN) |
203822 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
9098 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection. |
9 (RLIN) |
203823 |
920 ## - Programme |
Programme |
CIT(DIP) : 540129 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
22572 |
Koha biblioitemnumber |
22572 |