| 000 -LEADER |
| fixed length control field |
03444cam a22004817i 4500 |
| 001 - CONTROL NUMBER |
| control field |
19506069 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
NUST |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20221010133553.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
170216t20172017inu b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2017934291 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119396215 |
| Qualifying information |
(paperback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1119396212 |
| Qualifying information |
(paperback) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocn986788432 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
PNX |
| Language of cataloging |
eng |
| Transcribing agency |
PNX |
| Description conventions |
rda |
| Modifying agency |
OCLCO |
| -- |
JQM |
| -- |
OCLCQ |
| -- |
BDX |
| -- |
OCLCF |
| -- |
BKL |
| -- |
CHVBK |
| -- |
OCLCO |
| -- |
OCLCA |
| -- |
IGA |
| -- |
JQW |
| -- |
OCL |
| -- |
DLC |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
G758 2017 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8, GRI |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Grimes, Roger A., |
| Relator term |
author. |
| 9 (RLIN) |
99687 |
| 245 10 - TITLE STATEMENT |
| Title |
Hacking the hacker : |
| Remainder of title |
learn from the experts who take down hackers / |
| Statement of responsibility, etc. |
Roger A. Grimes. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
| Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons, Inc., |
| Date of production, publication, distribution, manufacture, or copyright notice |
[2017] |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2017 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxx, 286 pages ; |
| Dimensions |
23 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
What type of hacker are you? (Page-1), How hackers hack (Page-9),Profile: Bruce Schneier (Page-23),Social engineering (Page-27),Profile: Kevin Mitnick (Page-33), Software vulnerabilities (Page-39),Profile: Michael Howard (Page-45),Profile: Gary McGraw (Page-51),Malware (Page-55),Profile: Susan Bradley (Page-61),Profile: Mark Russinovich (Page-65),Cryptography (Page-69),Profile: Martin Hellman (Page-75), Intrusion detection/APTs (Page-81),Profile: Dr. Dorothy E. Denning (Page-87),Profile: Michael Dubinsky (Page-91),Firewalls (Page-95),Profile: William Cheskwick (Page-101),Honeypots (Page-107),Profile: Lance Spitzner (Page-111),Password hacking (Page-115),Profile: Dr. Cormac Herley (Page-123),Wireless hacking (Page-127),Profile: Thomas d'Otreppe de Bouvette (Page-133),Penetration testing (Page-137),Profile: Aaron Higbee (Page-147),Profile: Benild Joseph (Page-151),DDoS attacks (Page-155),Profile: Brian Krebs (Page-161),Secure OS (Page-165),Profile: Joanna Rutkowska (Page-171),Profile: Aaron Margosis (Page-175),Network attacks (Page-181),Profile: Laura Chappell (Page-185),IoT hacking (Page-189),Profile: Dr. Charlie Mille (Page-193), Policy and strategy (Page-201),Profile: Jing de Jong-Chen (Page-205),Threat modeling (Page-211),Profile: Adam Shostack (Page-217),Computer security education (Page-221),Profile: Stephen Northcutt (Page-227),Privacy (Page-231),Profile: Eva Galperin (Page-235),Patching (Page-239),Profile: Window Snyder (Page-245),Writing as a career (Page-249),Profile: Fahmida Y. Rashid (Page-259),Guide for parents with young hackers (Page-263),Hacker code of ethics (Page-271). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
570 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hackers. |
| 9 (RLIN) |
27628 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hacking. |
| 9 (RLIN) |
99688 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cryptography. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
466 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
COMPUTERS / Security / Cryptography. |
| Source of heading or term |
bisacsh |
| 9 (RLIN) |
6108 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cryptography. |
| Source of heading or term |
fast |
| Authority record control number or standard number |
(OCoLC)fst00884552 |
| 9 (RLIN) |
99689 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| Source of heading or term |
fast |
| Authority record control number or standard number |
(OCoLC)fst00872341 |
| 9 (RLIN) |
466 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| Source of heading or term |
fast |
| Authority record control number or standard number |
(OCoLC)fst00872484 |
| 9 (RLIN) |
570 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hackers. |
| Source of heading or term |
fast |
| Authority record control number or standard number |
(OCoLC)fst00872150 |
| 9 (RLIN) |
27628 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hacking. |
| Source of heading or term |
fast |
| Authority record control number or standard number |
(OCoLC)fst01909643 |
| 9 (RLIN) |
99688 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computersicherheit |
| Source of heading or term |
gnd |
| 9 (RLIN) |
94105 |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
International Information Systems Security Certification Consortium. |
| 9 (RLIN) |
99690 |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
2 |
| e |
epcn |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
|
| Koha item type |
Book |