Hacking exposed 7 : (Record no. 58784)

MARC details
000 -LEADER
fixed length control field 03448nam a22004453i 4500
001 - CONTROL NUMBER
control field 712610
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230421144753.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200826s2012 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071780292
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780071780285
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC6255258
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC6255258
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL6255258
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)811318621
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
-- UkLoUWL
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name McClure, Stuart.
245 10 - TITLE STATEMENT
Title Hacking exposed 7 :
Remainder of title Network security secrets and solutions.
250 ## - EDITION STATEMENT
Edition statement 7th edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture :
Name of producer, publisher, distributor, manufacturer McGraw-Hill Education,
Date of production, publication, distribution, manufacture, or copyright notice 2012.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (848 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Hacking Exposed Ser.
520 ## - SUMMARY, ETC.
Summary, etc. E-book (3 copies)
520 ## - SUMMARY, ETC.
Summary, etc. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits. Defend against UNIX-based root access and buffer overflow hacks. Block SQL injection, spear phishing, and embedded-code attacks.Detect and terminate rootkits, Trojans, bots, worms, and malware. Lock down remote access using smartcards and hardware tokens. Protect 802.11 WLANs with multilayered encryption and gateways.Plug holes in VoIP, social networking, cloud, and Web 2.0 services.Learn about the latest iPhone and Android attacks and how to protect yourself.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Scambray, Joel.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kurtz, George.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading McClure, Stuart
Title Hacking Exposed 7 : Network Security Secrets and Solutions
Place, publisher, and date of publication : McGraw-Hill Education,c2012
International Standard Book Number 9780071780285
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Hacking Exposed Ser.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/uwestlon/detail.action?docID=6255258">https://ebookcentral.proquest.com/lib/uwestlon/detail.action?docID=6255258</a>
Public note click to view (3 copies)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Suppress in OPAC Do not suppress from OPAC
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
    Other/Generic Classification Scheme     Electronic publication Electronic publication 11/12/2018   23/04/2021 19/07/2021 E-book