000 -LEADER |
fixed length control field |
01358cam a22002654a 4500 |
001 - CONTROL NUMBER |
control field |
vtls003157101 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200226112148.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110218s2010 nyua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071591188 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071591184 (pbk.) |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
201102181229 |
Level of effort used to assign nonsubject heading access points |
VLOAD |
Level of effort used to assign subject headings |
201006231110 |
Level of effort used to assign classification |
shuhada |
Level of effort used to assign subject headings |
201006231042 |
Level of effort used to assign classification |
shuhada |
-- |
201006081829 |
-- |
jamalia |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
DAV 2010 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Davis, Michael A. |
9 (RLIN) |
38384 |
245 10 - TITLE STATEMENT |
Title |
Hacking exposed malware & rootkits : |
Remainder of title |
malware & rootkits security secrets & solutions / |
Statement of responsibility, etc. |
Michael Davis, Sean Bodmer, Aaron Lemasters. |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Hacking exposed malware and rootkits |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGraw Hill, |
Date of publication, distribution, etc. |
c2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 377 p. : |
Other physical details |
ill. ; |
Dimensions |
23 cm. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Pt. I, Malware. Method of infection ; Malware functionality -- Pt. II, Rootkits. User-mode rootkits ; Kernel-mode rootkits ; Virtual rootkits ; The future of rootkits : if you think it's bad now -- Pt. III, Prevention technologies. Antivirus ; Host protection systems ; Host-based intrusion prevention ; Rootkit detection ; General security practices -- Appendix. System integrity analysis : building your own rootkit detector. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
7460 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Bodmer, Sean. |
9 (RLIN) |
38385 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
LeMasters, Aaron. |
9 (RLIN) |
38386 |
920 ## - Programme |
Programme |
SOCIT : 145966 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
90857 |
Koha biblioitemnumber |
90857 |