Hacker techniques, tools, and incident handling / (Record no. 75170)

MARC details
000 -LEADER
fixed length control field 02087cam a2200349 i 4500
001 - CONTROL NUMBER
control field 0000068108
003 - CONTROL NUMBER IDENTIFIER
control field 0001
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240611123841.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151028s2014 mau 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284031713 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 005.8
Item number ORI-H
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Oriyano, Sean-Philip.
245 10 - TITLE STATEMENT
Title Hacker techniques, tools, and incident handling /
Medium [Book] /
Statement of responsibility, etc. Sean-Philip Oriyano.
250 ## - EDITION STATEMENT
Edition statement Second edition.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 417 pages :
Other physical details illustrations ;
Dimensions 24 cm.
490 1# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
520 ## - SUMMARY, ETC.
Summary, etc. Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
521 ## - TARGET AUDIENCE NOTE
Target audience note All.
Target audience note All
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
Topical term or geographic name entry element Hackers.
Topical term or geographic name entry element Electrical and Computer Engineering--
Form subdivision Electrical Engineering--
Topical term or geographic name entry element Electrical and Computer Engineering--
Topical term or geographic name entry element Sliding mode control
General subdivision Grid connected photovoltaic system
-- PBSMC.
Topical term or geographic name entry element Three phase inverter
General subdivision Environmental conditions
-- Substantial robustness.
852 ## - LOCATION
Piece designation 51863
Classification part 005.8 ORI-H
Sublocation or collection Ground Floor
Former shelving location Books
Copy number 1
Piece physical condition 1-New
Location JZL-CUI
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Date last seen Total checkouts Full call number Shelving location Price effective from Koha item type Lost status Damaged status Not for loan Withdrawn status Home library Barcode Current library Date acquired
09/12/2023   005.8 ORI-H Ground Floor 09/12/2023 Books         Junaid Zaidi Library, COMSATS University Islamabad 51863 Junaid Zaidi Library, COMSATS University Islamabad 09/12/2023