Defense against the black arts : (Record no. 3547)

MARC details
000 -LEADER
fixed length control field 01699cam a2200349Ii 4500
001 - CONTROL NUMBER
control field 9780429103766
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180331s2012 fluad ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429103766
Qualifying information (e-book : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781138453616
Qualifying information (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781439821190
Qualifying information (paperback)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/b11193
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)761369094
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .V38 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number V325
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Varsalone, Jesse.,
Relator term author.
9 (RLIN) 4466
245 10 - TITLE STATEMENT
Title Defense against the black arts :
Remainder of title how hackers do what they do and how to protect against it /
Statement of responsibility, etc. Jesse Varsalone, Matthew McFadden ; with Sean Morrissey. [and others] ; foreword by Joe McCray.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, Fla. :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xvi, 396 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note An Auerbach book.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Hacking Windows OS -- 2. Obtaining Windows passwords -- 3. Imaging and extraction -- 4. Bypassing Web filters -- 5. Manipulating the Web -- 6. Finding it all on the Net -- 7. Research time -- 8. Capturing network traffic -- 9. Research time : finding the vulnerabilities -- 10. Metasploit -- 11. Other attack tools -- 12. Social engineering with Web 2.0 -- 13. Hack the Macs -- 14. Wireless hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer hackers.
9 (RLIN) 23875
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 4467
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McFadden, Matthew.
9 (RLIN) 4472
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Morrissey, Sean.
9 (RLIN) 4473
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781138453616
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781439821220">https://www.taylorfrancis.com/books/9781439821220</a>
Public note Taylor & Francis .
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-books

No items available.