000 -LEADER |
fixed length control field |
02834pam a2200373 i 4500 |
001 - CONTROL NUMBER |
control field |
2013048343 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
local |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170215093635.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131211s2014 nyua 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2013048343 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071800143 (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
007180014X (paperback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
BTCTA |
-- |
YDXCP |
-- |
BDX |
-- |
SINLB |
-- |
NhCcYBP |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
S5233 2014 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
COM053000 |
Source of number |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Shema, Mike, |
Relator term |
author. |
Authority record control number |
(local)67678 |
245 10 - TITLE STATEMENT |
Title |
Anti-hacker tool kit / |
Remainder of title |
Mike Shema |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Anti hacker tool kit |
250 ## - EDITION STATEMENT |
Edition statement |
Fourth edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New York : |
Name of publisher, distributor, etc |
McGraw-Hill Education, |
Date of publication, distribution, etc |
[2014] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 601 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Revision of: Anti-hacker tool kit / Mike Shema ... [et al.]. -- 3rd ed. -- New York : McGraw-Hill/Osborne, ©2006. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: - Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options - Vulnerability scanners: OpenVAS, Metasploit - File system monitors: AIDE, Samhain, Tripwire - Windows auditing tools: Nbtstat, Cain, MBSA, PsTools - Command-line networking tools: Netcat, Cryptcat, Ncat, Socat - Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay - Port scanners: Nmap, THC-Amap - Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort - Network defenses: firewalls, packet filters, and intrusion detection systems - War dialers: ToneLoc, THC-Scan, WarVOX - Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap - Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra - Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion - Privacy Tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR"-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
Authority record control number |
(local)61328 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Authority record control number |
(local)59482 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Security / General. |
Source of heading or term |
bisacsh |
Authority record control number |
(local)65842 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |