<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01344    a2200253   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207154047.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2008009610</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0470179864 (paper/DVD)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780470179864 (paper/DVD)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)ocn166873219</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Gregg, Michael</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Build your own security lab -(E-BOOK)</subfield>
    <subfield code="c">Michael Gregg.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Indianapolis, IN :</subfield>
    <subfield code="b">Wiley,</subfield>
    <subfield code="c">c2008.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxvi, 428 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm. +</subfield>
    <subfield code="e">1 DVD (4 3/4 in.)</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
    <subfield code="a">Hardware and Gear (Page-1) Building a Software Test Platform (Page-31) Passive Information Gathering (Page-63) Detecting Live Systems (Page-105) Enumerating Systems (Page-149) Automated Attack and Penetration Tools (Page-189) Understanding Cryptographic Systems (Page-225) Defeating Malware (Page-259) Securing Wireless Systems (Page-291) Intrusion Detection (Page-325) Forensic Detection (Page-365)  </subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures</subfield>
    <subfield code="x">Testing.</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">E-BOOK</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Contributor biographical information</subfield>
    <subfield code="u">http://catdir.loc.gov/catdir/enhancements/fy0827/2008009610-b.html</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Publisher description</subfield>
    <subfield code="u">http://catdir.loc.gov/catdir/enhancements/fy0814/2008009610-d.html</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Table of contents only</subfield>
    <subfield code="u">http://catdir.loc.gov/catdir/enhancements/fy0814/2008009610-t.html</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">192926</subfield>
    <subfield code="d">192926</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8  GRE</subfield>
    <subfield code="p">MCSEB-2319</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
