MARC details
000 -LEADER |
fixed length control field |
01645nam a2200289 a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180206t2015 flua b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781482231618 |
Qualifying information |
paperback |
Terms of availability |
GBP44.99 |
040 ## - CATALOGING SOURCE |
Language of cataloging |
eng |
Modifying agency |
SFPAGOH |
Description conventions |
rda |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
kpm QA76.9.A25 |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
B195 2015 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Baloch, Rafay |
Relator term |
author |
245 1# - TITLE STATEMENT |
Title |
Ethical hacking and penetration testing guide / |
Statement of responsibility, etc. |
Rafay Baloch |
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Boca Raton |
Name of producer, publisher, distributor, manufacturer |
CRC Press, Taylor & Francis Group |
Date of production, publication, distribution, manufacture, or copyright notice |
2015 |
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2015 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 503 pages : |
Other physical details |
illustration ; |
Dimensions |
26cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Include bibliographical references and index |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- |
Assigning source |
Provided by publisher. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
a |
.b10063183 |
b |
30-12-19 |
c |
06-02-18 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
-- |
m |
Operator's initials, OID (RLIN) |
06-02-18 |
Cataloger's initials, CIN (RLIN) |
m |
First date, FD (RLIN) |
a |
-- |
- |
-- |
eng |
-- |
flu |
-- |
0 |