Counter hack : (Record no. 22572)

000 -LEADER
fixed length control field 01816nam a2200229 4500
001 - CONTROL NUMBER
control field vtls002256060
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200306153852.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110218s2002 njua 001 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0130332739
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201909201142
Level of effort used to assign nonsubject heading access points ummi
Level of effort used to assign subject headings 201102181241
Level of effort used to assign classification VLOAD
-- 200407271931
-- VLOAD
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number SKO
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Skoudis, Ed.
9 (RLIN) 203821
245 10 - TITLE STATEMENT
Title Counter hack :
Remainder of title a step-by-step guide to computer attacks and effective defenses /
Statement of responsibility, etc. Ed Skoudis
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, N.J. :
Name of publisher, distributor, etc. Prentice Hall PTR,
Date of publication, distribution, etc. c2002
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 564 p. :
Other physical details ill. ;
Dimensions 23 cm.
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Prentice Hall series in computer networking and distributed systems / Radia Perlman, series editor
9 (RLIN) 203822
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 9098
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 203823
920 ## - Programme
Programme CIT(DIP) : 540129
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 22572
Koha biblioitemnumber 22572
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Cost, normal purchase price Total Checkouts Barcode Date last seen Date last checked out Copy number Uniform Resource Identifier Cost, replacement price Koha item type Public note
          Taylor's Library-TU Taylor's Library-TU 2004-07-27 231.48 17 5000040909 2019-12-05 2014-10-31 1 Floor 3, Shelf 1 , Side 1, TierNo 6, BayNo 7 231.48 Main Collection SOCIT,15009,03,GR