Hacking : (Record no. 590399)

000 -LEADER
fixed length control field 01431cam a22003377a 4500
001 - CONTROL NUMBER
control field 15045036
003 - CONTROL NUMBER IDENTIFIER
control field NUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220720133941.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071015s2008 caua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2007042910
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781593271442 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1593271441 (hbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn175218338
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)175218338
Canceled/invalid control number (OCoLC)148663724
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency BTCTA
-- BAKER
-- YDXCP
-- C#P
-- DLC
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number E75 2008
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8, ERI
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Erickson, Jon,
Dates associated with a name 1977-
9 (RLIN) 94067
245 10 - TITLE STATEMENT
Title Hacking :
Remainder of title the art of exploitation /
Statement of responsibility, etc. Jon Erickson.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. San Francisco, CA :
Name of publisher, distributor, etc. No Starch Press,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent x, 472 p. :
Other physical details ill. ;
Dimensions 23 cm. +
Accompanying material 1 CD-ROM (4 3/4 in.)
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 0x100. Introduction (Page-1), 0x200. Programming (Page-5), 0x300. Exploitation (Page-115), 0x400. Networking (Page-195), 0x500. Shellcode (Page-281), 0x600. Countermeasures (Page-319), 0x700. Cryptology (Page-393), 0x800. Conclusion (Page-451)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 570
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
9 (RLIN) 27628
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 466
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/toc/fy0804/2007042910.html">http://www.loc.gov/catdir/toc/fy0804/2007042910.html</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Reference 07/20/2022 005.8,ERI MCS38622 07/20/2022 07/20/2022 Book Almirah Fresh No.43, Shelf No.6
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.