MARC details
000 -LEADER |
fixed length control field |
02087cam a2200349 i 4500 |
001 - CONTROL NUMBER |
control field |
0000068108 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
0001 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240611123841.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151028s2014 mau 000 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284031713 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
ORI-H |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Oriyano, Sean-Philip. |
245 10 - TITLE STATEMENT |
Title |
Hacker techniques, tools, and incident handling / |
Medium |
[Book] / |
Statement of responsibility, etc. |
Sean-Philip Oriyano. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvii, 417 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
490 1# - SERIES STATEMENT |
Series statement |
Jones & Bartlett Learning information systems security & assurance series |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
All. |
|
Target audience note |
All |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
|
Topical term or geographic name entry element |
Hackers. |
|
Topical term or geographic name entry element |
Electrical and Computer Engineering-- |
Form subdivision |
Electrical Engineering-- |
|
Topical term or geographic name entry element |
Electrical and Computer Engineering-- |
|
Topical term or geographic name entry element |
Sliding mode control |
General subdivision |
Grid connected photovoltaic system |
-- |
PBSMC. |
|
Topical term or geographic name entry element |
Three phase inverter |
General subdivision |
Environmental conditions |
-- |
Substantial robustness. |
852 ## - LOCATION |
Piece designation |
51863 |
Classification part |
005.8 ORI-H |
Sublocation or collection |
Ground Floor |
Former shelving location |
Books |
Copy number |
1 |
Piece physical condition |
1-New |
Location |
JZL-CUI |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |