MARC details
000 -LEADER |
fixed length control field |
02210cam a2200361 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190822114430.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140313t20152015flua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781482231618 (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1482231611 (paperback) |
041 ## - LANGUAGE CODE |
Language |
English |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
BAL |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
COM053000 |
-- |
COM043000 |
-- |
LAW041000 |
Source of number |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Baloch, Rafay. |
245 10 - TITLE STATEMENT |
Title |
Ethical hacking and penetration testing guide / |
Statement of responsibility, etc |
Rafay Baloch. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton : |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 503 pages : |
Other physical details |
illustrations ; |
Dimensions |
26 cm |
505 ## - FORMATTED CONTENTS NOTE |
Title |
1. Introduction to hacking <br/> |
-- |
2. Linux basics <br/> |
-- |
3. Information gathering techniques <br/> |
-- |
4. Target enumeration and port scanning techniques <br/> |
-- |
5. Vulnerability assessment <br/> |
-- |
6. Network sniffing <br/> |
-- |
7. Remote exploitation <br/> |
-- |
8. Client side exploitation <br/> |
-- |
9. Postexploitation <br/> |
-- |
10. Windows exploit development basics <br/> |
-- |
11. Wireless hacking <br/> |
-- |
12. Web hacking. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Penetration testing (Computer security) |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Security / General. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS / Networking / General. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
LAW / Forensic Science. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg">http://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg</a> |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Source of heading or term |
bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Source of heading or term |
bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Source of heading or term |
bisacsh |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Cover image |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |