MARC details
000 -LEADER |
fixed length control field |
03656nam a2200613 i 4500 |
001 - CONTROL NUMBER |
control field |
686299 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230418192933.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr|||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
130516s2013 ne a fs 001|0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780124116412 (ebook) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(StDuBDS)AH25541972 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
StDuBDS |
Language of cataloging |
eng |
Transcribing agency |
StDuBDS |
Modifying agency |
StDuBDSZ |
Description conventions |
rda |
Modifying agency |
UkPrAHLS |
050 #0 - |
-- |
QA76.9.A25 |
-- |
E5443 2013 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM |
Source |
ukslc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
U |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URH |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
U |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
URH |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UB |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UFL |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
thema |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
KJ |
Source |
thema |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Engebretson, Pat |
Fuller form of name |
(Patrick Henry), |
Dates associated with a name |
1974- |
Relator term |
author. |
245 14 - TITLE STATEMENT |
Title |
The basics of hacking and penetration testing |
Remainder of title |
ethical hacking and penetration testing made easy / |
Statement of responsibility, etc. |
Dr. Patrick Engebretson. |
246 30 - VARYING FORM OF TITLE |
Title proper/short title |
Hacking and penetration testing |
250 ## - EDITION STATEMENT |
Edition statement |
2nd edition. |
Remainder of edition statement |
David Kennedy, technical editor. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Amsterdam : |
Name of producer, publisher, distributor, manufacturer |
Syngress, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2013] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 204 pages : |
Other physical details |
illustrations (black and white) |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
336 ## - CONTENT TYPE |
Content type term |
still image |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
366 ## - TRADE AVAILABILITY INFORMATION |
Detailed date of publication |
20130912 |
500 ## - GENERAL NOTE |
General note |
Previous edition: 2011. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 8# - SUMMARY, ETC. |
Summary, etc. |
An introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilise and interpret the results of modern day hacking tools which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. |
Expansion of summary note |
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in printed form ISBN 9780124116443 |
533 ## - REPRODUCTION NOTE |
Type of reproduction |
Electronic reproduction. |
Agency responsible for reproduction |
Askews and Holts. |
Note about reproduction |
Mode of access: World Wide Web. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer hackers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer software |
General subdivision |
Testing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Prevention. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computers and IT. |
Source of heading or term |
ukslc |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computing & information technology |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer fraud & hacking |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information technology: general issues |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Enterprise software |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
Source of heading or term |
thema |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business & Management |
Source of heading or term |
thema |
655 #7 - INDEX TERM--GENRE/FORM |
Source of term |
lcsh |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kennedy, David, |
Relator term |
editor. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9780124116412">http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9780124116412</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Suppress in OPAC |
Do not suppress from OPAC |