Hacking exposed malware & rootkits : (Record no. 90857)

000 -LEADER
fixed length control field 01358cam a22002654a 4500
001 - CONTROL NUMBER
control field vtls003157101
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200226112148.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110218s2010 nyua 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071591188 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071591184 (pbk.)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 201102181229
Level of effort used to assign nonsubject heading access points VLOAD
Level of effort used to assign subject headings 201006231110
Level of effort used to assign classification shuhada
Level of effort used to assign subject headings 201006231042
Level of effort used to assign classification shuhada
-- 201006081829
-- jamalia
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number DAV 2010
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Davis, Michael A.
9 (RLIN) 38384
245 10 - TITLE STATEMENT
Title Hacking exposed malware & rootkits :
Remainder of title malware & rootkits security secrets & solutions /
Statement of responsibility, etc. Michael Davis, Sean Bodmer, Aaron Lemasters.
246 3# - VARYING FORM OF TITLE
Title proper/short title Hacking exposed malware and rootkits
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw Hill,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 377 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Pt. I, Malware. Method of infection ; Malware functionality -- Pt. II, Rootkits. User-mode rootkits ; Kernel-mode rootkits ; Virtual rootkits ; The future of rootkits : if you think it's bad now -- Pt. III, Prevention technologies. Antivirus ; Host protection systems ; Host-based intrusion prevention ; Rootkit detection ; General security practices -- Appendix. System integrity analysis : building your own rootkit detector.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 7460
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bodmer, Sean.
9 (RLIN) 38385
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name LeMasters, Aaron.
9 (RLIN) 38386
920 ## - Programme
Programme SOCIT : 145966
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 90857
Koha biblioitemnumber 90857
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Cost, normal purchase price Total Checkouts Barcode Date last seen Date last checked out Copy number Cost, replacement price Koha item type Public note
          Taylor's Library-TU Taylor's Library-TU 2010-06-23 112.36 10 5000101232 2019-12-05 2018-09-12 1 112.36 Main Collection SOCIT,15009,03,GR