NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Hacking the hacker : (Record no. 12436)

MARC details
000 -LEADER
fixed length control field 06873cam a2200865 i 4500
001 - CONTROL NUMBER
control field ocn983465946
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125540.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170421s2017 inu ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency DG1
-- N$T
-- YDX
-- TEFOD
-- IDEBK
-- EBLCP
-- UMI
-- STF
-- TOH
-- OCLCF
-- IDB
-- OTZ
-- OCLCQ
-- DEBSZ
-- RECBK
-- OCLCA
-- UAB
-- COO
-- K6U
-- LIV
-- D6H
-- OCLCQ
-- MERUC
-- HCO
-- CEF
-- CUY
-- KSU
-- ZCU
-- RRP
-- ICG
-- INT
-- BRX
-- VT2
-- OCLCQ
-- UKMGB
-- WYU
-- OCLCQ
-- LVT
-- S9I
-- U3W
-- OCLCQ
-- ESU
-- DKC
-- UKAHL
-- OCLCQ
-- BRF
-- OCLCO
-- OCLCQ
-- INARC
-- OCLCQ
-- OCLCO
-- OCLCL
-- OCLCQ
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB779770
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 018321939
Source Uk
019 ## -
-- 983872386
-- 984223281
-- 984283613
-- 984545495
-- 984676640
-- 985242338
-- 985260858
-- 985279349
-- 985346428
-- 985396642
-- 985399857
-- 985401176
-- 985483382
-- 985636160
-- 985762169
-- 986022708
-- 986475403
-- 986723317
-- 986806315
-- 987331224
-- 988756473
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119396260
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119396263
Qualifying information (electronic bk. ;
-- oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119396222
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119396220
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119396239
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119396239
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119396215
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119396212
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000059917691
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000060098484
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000060227577
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 011081423
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000951806
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 484207024
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 49114105X
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 1004859007
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 018321939
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000066157301
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)983465946
Canceled/invalid control number (OCoLC)983872386
-- (OCoLC)984223281
-- (OCoLC)984283613
-- (OCoLC)984545495
-- (OCoLC)984676640
-- (OCoLC)985242338
-- (OCoLC)985260858
-- (OCoLC)985279349
-- (OCoLC)985346428
-- (OCoLC)985396642
-- (OCoLC)985399857
-- (OCoLC)985401176
-- (OCoLC)985483382
-- (OCoLC)985636160
-- (OCoLC)985762169
-- (OCoLC)986022708
-- (OCoLC)986475403
-- (OCoLC)986723317
-- (OCoLC)986806315
-- (OCoLC)987331224
-- (OCoLC)988756473
037 ## - SOURCE OF ACQUISITION
Stock number FE56BC1D-7EB0-4C28-AE99-C4011523F72C
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/7
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Grimes, Roger A.,
Relator term author.
245 10 - TITLE STATEMENT
Title Hacking the hacker :
Remainder of title learn from the experts who take down hackers /
Statement of responsibility, etc. Roger A. Grimes.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 0# - SERIES STATEMENT
Series statement ITpro collection
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note What Type of Hacker Are You? -- How Hackers Hack -- Profile -- Social Engineering -- Profile -- Software Vulnerabilities -- Profile -- Profile -- Malware -- Profile -- Profile -- Cryptography -- Profile -- Intrusion Detection/APTs -- Profile -- Profile -- Firewalls -- Profile -- Honeypots -- Profile -- Password Hacking -- Profile -- Wireless Hacking -- Profile -- Penetration Testing -- Profile -- Profile -- DDoS Attacks -- Profile -- Secure OS -- Profile -- Profile -- Network Attacks -- Profile -- IoT Hacking -- Profile -- Policy and Strategy -- Profile -- Threat Modeling -- Profile -- Computer Security Education -- Profile -- Privacy -- Profile -- Patching -- Profile -- Writing as a Career -- Profile -- Guide for Parents with Young Hackers -- Hacker Code of Ethics.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (John Wiley, viewed April 26, 2017).
520 ## - SUMMARY, ETC.
Summary, etc. Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.-Go deep into the world of white hat hacking to grasp just how critical cybersecurity is -Read the stories of some of the world's most renowned computer security experts -Learn how hackers do what they do-no technical expertise necessary -Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Piratage informatique.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking
Source of heading or term fast
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Hacking the hacker (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCH3jrRtPYvGkVf4RQrPWjC
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Grimes, Roger A.
Title Hacking the hacker.
Place, publisher, and date of publication Indianapolis, IN : Wiley, 2017
International Standard Book Number 1119396212
-- 9781119396215
Record control number (OCoLC)967719056
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260</a>
938 ## -
-- Internet Archive
-- INAR
-- hackinghackerlea0000grim
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH32559922
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH32559923
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL4845208
938 ## -
-- EBSCOhost
-- EBSC
-- 1506358
938 ## -
-- ProQuest MyiLibrary Digital eBook Collection
-- IDEB
-- cis37318022
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00716090
938 ## -
-- YBP Library Services
-- YANK
-- 14247966
938 ## -
-- YBP Library Services
-- YANK
-- 14264169
938 ## -
-- YBP Library Services
-- YANK
-- 14256206
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha