| 000 -LEADER |
| fixed length control field |
01888 a2200313 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20241019110708.0 |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2006101131 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0782144373 (pbk./cd-rom) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780782144376 (pbk./cd-rom) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)76961319 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocm76961319 |
| 040 ## - CATALOGING SOURCE |
| Transcribing agency |
Nust |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8,GRA |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Graves, Kimberly, |
| 9 (RLIN) |
126387 |
| 245 10 - TITLE STATEMENT |
| Title |
CEH : |
| Remainder of title |
official certified ethical hacker review guide / |
| Statement of responsibility, etc. |
Kimberly Graves |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
Certified ethical hacker |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Indianapolis, Ind. : |
| Name of publisher, distributor, etc. |
Wiley Pub., |
| Date of publication, distribution, etc. |
c2007. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxii, 238 p. : |
| Other physical details |
ill. ; |
| Dimensions |
23 cm. + |
| Accompanying material |
1 CD-ROM (4 3/4 in.) |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Introduction to ethical hacking, ethics, and legality (Page-1), Footprinting and social engineering (Page-19), Scanning and enumeration (Page-41), System hacking (Page-67), Trojans, backdoors, viruses, and worms (Page-91), Sniffers (Page-107), Denial of service and session hijacking (Page-119), Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques (Page-137), SQL injection and buffer overflows (Page-151), Wireless hacking (Page-159), Physical security (Page-169), Linux hacking (Page-177), Evading IDSs, honeypots, and firewalls (Page-187), Cryptography (Page-195), Penetration testing methodologies (Page-203). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer hackers |
| General subdivision |
Examinations |
| 9 (RLIN) |
126388 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Examinations |
| 9 (RLIN) |
94252 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| General subdivision |
Examinations |
| 9 (RLIN) |
95207 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Electronic data processing personnel |
| General subdivision |
Certification. |
| 9 (RLIN) |
81704 |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Contributor biographical information |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0741/2006101131-b.html">http://www.loc.gov/catdir/enhancements/fy0741/2006101131-b.html</a> |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Publisher description |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0653/2006101131-d.html">http://www.loc.gov/catdir/enhancements/fy0653/2006101131-d.html</a> |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Table of contents only |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/toc/ecip0718/2006101131.html">http://www.loc.gov/catdir/toc/ecip0718/2006101131.html</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
|
| Koha item type |
Book |