The hacker's handbook (Record no. 47330)

000 -LEADER
fixed length control field 01826 a2200181 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0849308887
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780849308888
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number YOH
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Young, Susan
245 14 - TITLE STATEMENT
Title The hacker's handbook
Sub Title the strategy behind breaking into and defending networks
Statement of responsibility, etc Susan Young
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton
Name of publisher Auerbach Publications
Year of publication 2003
300 ## - PHYSICAL DESCRIPTION
Number of Pages 896 p.
500 ## - GENERAL NOTE
General note HB
520 ## - SUMMARY, ETC.
Summary, etc The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks-Security measures
-- Computer networks-Access control
-- Computer hackers
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Aitel, Dave (jt.auth)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Price effective from Permanent Location Not for loan Date acquired Koha item type Accession Number Lost status Damaged status Shelving location Withdrawn status Current Location Full call number
2015-02-12Central Library AIOU Islamabad 2007-06-12Reference108217  Reference Central Library AIOU Islamabad005.8 YOH

Copyright © 2023, All rights reserved
AIOU, Islamabad Pakistan.
Ph#: | 051-9250040, 051-9571682, 051-9571695 Fax: | 051-9250146 Email| documentdelivery@aiou.edu.pk Web| ”Central Library”