Hacker techniques, tools, and incident handling (Record no. 4538)

MARC details
000 -LEADER
fixed length control field 01471nam a22002177a 4500
003 - CONTROL NUMBER IDENTIFIER
control field BML
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284031713
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number ORI
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Oriyano, Sean-Philip.
245 10 - TITLE STATEMENT
Title Hacker techniques, tools, and incident handling
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington
Name of publisher, distributor, etc Jones & Bartlett Learning
Date of publication, distribution, etc 2014
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 417 pages :
490 1# - SERIES STATEMENT
Series statement Jones & Bartlett Learning information systems security & assurance series
520 ## - SUMMARY, ETC.
Summary, etc. Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hackers.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Price effective from Koha item type Public note
    Dewey Decimal Classification   Not For Loan Reference BMU Library BMU Library 1-E 16/10/2018 IBC (Bill No. - IN1556, Date:- 26.09.2018) 4641.00 005.8 ORI 12784 16/10/2018 16/10/2018 Books School of Engineering & Technology

Powered by Koha