Hacker techniques, tools, and incident handling (Record no. 4538)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01471nam a22002177a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | BML |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781284031713 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | ORI |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Oriyano, Sean-Philip. |
245 10 - TITLE STATEMENT | |
Title | Hacker techniques, tools, and incident handling |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Burlington |
Name of publisher, distributor, etc | Jones & Bartlett Learning |
Date of publication, distribution, etc | 2014 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 417 pages : |
490 1# - SERIES STATEMENT | |
Series statement | Jones & Bartlett Learning information systems security & assurance series |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Penetration testing (Computer security) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Hackers. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Not For Loan | Reference | BMU Library | BMU Library | 1-E | 16/10/2018 | IBC (Bill No. - IN1556, Date:- 26.09.2018) | 4641.00 | 005.8 ORI | 12784 | 16/10/2018 | 16/10/2018 | Books | School of Engineering & Technology |