MARC details
000 -LEADER |
fixed length control field |
02872cam a22004817i 4500 |
001 - CONTROL NUMBER |
control field |
18845685 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250303112556.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
151104s2016 njua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015956627 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119154685 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119154686 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn908805314 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDXCP |
Language of cataloging |
eng |
Transcribing agency |
YDXCP |
Description conventions |
rda |
Modifying agency |
BTCTA |
-- |
OCLCQ |
-- |
SFR |
-- |
CGP |
-- |
JQM |
-- |
JTH |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 BEA 23336 |
Edition number |
23 |
Item number |
23336 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Beaver, Kevin, |
Relator term |
author. |
9 (RLIN) |
2026 |
245 10 - TITLE STATEMENT |
Title |
Hacking for dummies / |
Statement of responsibility, etc. |
by Kevin Beaver ; foreword by Richard Stiennon. |
250 ## - EDITION STATEMENT |
Edition statement |
5th edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons, Inc., |
Date of production, publication, distribution, manufacture, or copyright notice |
[2016] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2016 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 390 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
--For dummies |
500 ## - GENERAL NOTE |
General note |
Previous edition: 2013. |
500 ## - GENERAL NOTE |
General note |
Includes and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
473 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
9 (RLIN) |
741 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stiennon, Richard, |
Dates associated with a name |
1959- |
Relator term |
author of introduction, etc. |
9 (RLIN) |
2027 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
--For dummies. |
9 (RLIN) |
274 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Contributor biographical information |
Uniform Resource Identifier |
<a href="https://www.loc.gov/catdir/enhancements/fy1701/2015956627-b.html">https://www.loc.gov/catdir/enhancements/fy1701/2015956627-b.html</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
Uniform Resource Identifier |
<a href="https://www.loc.gov/catdir/enhancements/fy1701/2015956627-d.html">https://www.loc.gov/catdir/enhancements/fy1701/2015956627-d.html</a> |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents only |
Uniform Resource Identifier |
<a href="https://www.loc.gov/catdir/enhancements/fy1701/2015956627-t.html">https://www.loc.gov/catdir/enhancements/fy1701/2015956627-t.html</a> |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
Suppress in OPAC |
No |