Ethical hacking and penetration testing guide / (Record no. 3909)

MARC details
000 -LEADER
fixed length control field 01645nam a2200289 a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180206t2015 flua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781482231618
Qualifying information paperback
Terms of availability GBP44.99
040 ## - CATALOGING SOURCE
Language of cataloging eng
Modifying agency SFPAGOH
Description conventions rda
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) kpm QA76.9.A25
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) B195 2015
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Baloch, Rafay
Relator term author
245 1# - TITLE STATEMENT
Title Ethical hacking and penetration testing guide /
Statement of responsibility, etc. Rafay Baloch
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton
Name of producer, publisher, distributor, manufacturer CRC Press, Taylor & Francis Group
Date of production, publication, distribution, manufacture, or copyright notice 2015
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015
300 ## - PHYSICAL DESCRIPTION
Extent xxvii, 503 pages :
Other physical details illustration ;
Dimensions 26cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Include bibliographical references and index
520 ## - SUMMARY, ETC.
Summary, etc. "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b10063183
b 30-12-19
c 06-02-18
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- m
Operator's initials, OID (RLIN) 06-02-18
Cataloger's initials, CIN (RLIN) m
First date, FD (RLIN) a
-- -
-- eng
-- flu
-- 0
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
        PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH   18/06/2024   kpm QA76.9.A25 B195 2015 SF0002219 18/06/2024 18/06/2024 Books - Printed

Powered by Koha