Hacking the hacker : (Record no. 591620)

000 -LEADER
fixed length control field 03444cam a22004817i 4500
001 - CONTROL NUMBER
control field 19506069
003 - CONTROL NUMBER IDENTIFIER
control field NUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221010133553.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170216t20172017inu b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2017934291
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119396215
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119396212
Qualifying information (paperback)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn986788432
040 ## - CATALOGING SOURCE
Original cataloging agency PNX
Language of cataloging eng
Transcribing agency PNX
Description conventions rda
Modifying agency OCLCO
-- JQM
-- OCLCQ
-- BDX
-- OCLCF
-- BKL
-- CHVBK
-- OCLCO
-- OCLCA
-- IGA
-- JQW
-- OCL
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number G758 2017
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8, GRI
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Grimes, Roger A.,
Relator term author.
9 (RLIN) 99687
245 10 - TITLE STATEMENT
Title Hacking the hacker :
Remainder of title learn from the experts who take down hackers /
Statement of responsibility, etc. Roger A. Grimes.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice [2017]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2017
300 ## - PHYSICAL DESCRIPTION
Extent xxx, 286 pages ;
Dimensions 23 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note What type of hacker are you? (Page-1), How hackers hack (Page-9),Profile: Bruce Schneier (Page-23),Social engineering (Page-27),Profile: Kevin Mitnick (Page-33), Software vulnerabilities (Page-39),Profile: Michael Howard (Page-45),Profile: Gary McGraw (Page-51),Malware (Page-55),Profile: Susan Bradley (Page-61),Profile: Mark Russinovich (Page-65),Cryptography (Page-69),Profile: Martin Hellman (Page-75), Intrusion detection/APTs (Page-81),Profile: Dr. Dorothy E. Denning (Page-87),Profile: Michael Dubinsky (Page-91),Firewalls (Page-95),Profile: William Cheskwick (Page-101),Honeypots (Page-107),Profile: Lance Spitzner (Page-111),Password hacking (Page-115),Profile: Dr. Cormac Herley (Page-123),Wireless hacking (Page-127),Profile: Thomas d'Otreppe de Bouvette (Page-133),Penetration testing (Page-137),Profile: Aaron Higbee (Page-147),Profile: Benild Joseph (Page-151),DDoS attacks (Page-155),Profile: Brian Krebs (Page-161),Secure OS (Page-165),Profile: Joanna Rutkowska (Page-171),Profile: Aaron Margosis (Page-175),Network attacks (Page-181),Profile: Laura Chappell (Page-185),IoT hacking (Page-189),Profile: Dr. Charlie Mille (Page-193), Policy and strategy (Page-201),Profile: Jing de Jong-Chen (Page-205),Threat modeling (Page-211),Profile: Adam Shostack (Page-217),Computer security education (Page-221),Profile: Stephen Northcutt (Page-227),Privacy (Page-231),Profile: Eva Galperin (Page-235),Patching (Page-239),Profile: Window Snyder (Page-245),Writing as a career (Page-249),Profile: Fahmida Y. Rashid (Page-259),Guide for parents with young hackers (Page-263),Hacker code of ethics (Page-271).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 570
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
9 (RLIN) 27628
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking.
9 (RLIN) 99688
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 466
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / Cryptography.
Source of heading or term bisacsh
9 (RLIN) 6108
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00884552
9 (RLIN) 99689
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872341
9 (RLIN) 466
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872484
9 (RLIN) 570
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872150
9 (RLIN) 27628
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01909643
9 (RLIN) 99688
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computersicherheit
Source of heading or term gnd
9 (RLIN) 94105
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element International Information Systems Security Certification Consortium.
9 (RLIN) 99690
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) General Stacks 10/10/2022 2 005.8,GRI MCS38285 11/19/2024 10/17/2024 10/10/2022 Book Almirah Fresh No.43, Shelf No.5
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.