MARC details
000 -LEADER |
fixed length control field |
03448nam a22004453i 4500 |
001 - CONTROL NUMBER |
control field |
712610 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230421144753.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200826s2012 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071780292 |
Qualifying information |
(electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9780071780285 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(MiAaPQ)EBC6255258 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(MiAaPQ)EBC6255258 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Au-PeEL)EBL6255258 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)811318621 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
MiAaPQ |
Language of cataloging |
eng |
Description conventions |
rda |
-- |
pn |
Transcribing agency |
MiAaPQ |
Modifying agency |
MiAaPQ |
-- |
UkLoUWL |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
McClure, Stuart. |
245 10 - TITLE STATEMENT |
Title |
Hacking exposed 7 : |
Remainder of title |
Network security secrets and solutions. |
250 ## - EDITION STATEMENT |
Edition statement |
7th edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
: |
Name of producer, publisher, distributor, manufacturer |
McGraw-Hill Education, |
Date of production, publication, distribution, manufacture, or copyright notice |
2012. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (848 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Hacking Exposed Ser. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
E-book (3 copies) |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits. Defend against UNIX-based root access and buffer overflow hacks. Block SQL injection, spear phishing, and embedded-code attacks.Detect and terminate rootkits, Trojans, bots, worms, and malware. Lock down remote access using smartcards and hardware tokens. Protect 802.11 WLANs with multilayered encryption and gateways.Plug holes in VoIP, social networking, cloud, and Web 2.0 services.Learn about the latest iPhone and Android attacks and how to protect yourself. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) |
Local note |
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Scambray, Joel. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kurtz, George. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
Main entry heading |
McClure, Stuart |
Title |
Hacking Exposed 7 : Network Security Secrets and Solutions |
Place, publisher, and date of publication |
: McGraw-Hill Education,c2012 |
International Standard Book Number |
9780071780285 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) |
Corporate name or jurisdiction name as entry element |
ProQuest (Firm) |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Hacking Exposed Ser. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/uwestlon/detail.action?docID=6255258">https://ebookcentral.proquest.com/lib/uwestlon/detail.action?docID=6255258</a> |
Public note |
click to view (3 copies) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Suppress in OPAC |
Do not suppress from OPAC |
Source of classification or shelving scheme |
Dewey Decimal Classification |