The hacker's handbook (Record no. 47330)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01826 a2200181 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 0849308887 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780849308888 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | YOH |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Young, Susan |
245 14 - TITLE STATEMENT | |
Title | The hacker's handbook |
Sub Title | the strategy behind breaking into and defending networks |
Statement of responsibility, etc | Susan Young |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Boca Raton |
Name of publisher | Auerbach Publications |
Year of publication | 2003 |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 896 p. |
500 ## - GENERAL NOTE | |
General note | HB |
520 ## - SUMMARY, ETC. | |
Summary, etc | The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks-Security measures |
-- | Computer networks-Access control |
-- | Computer hackers |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Aitel, Dave (jt.auth) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Price effective from | Permanent Location | Not for loan | Date acquired | Koha item type | Accession Number | Lost status | Damaged status | Shelving location | Withdrawn status | Current Location | Full call number |
---|---|---|---|---|---|---|---|---|---|---|---|
2015-02-12 | Central Library AIOU Islamabad | 2007-06-12 | Reference | 108217 | Reference | Central Library AIOU Islamabad | 005.8 YOH |