MARC details
000 -LEADER |
fixed length control field |
02045nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200310121449.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170725s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071077316 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
VITAP |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23rd |
Classification number |
005.8 HAR |
245 #0 - TITLE STATEMENT |
Title |
Gray Hat Hacking : |
Remainder of title |
The Ethical Hacker's Handbook |
Statement of responsibility, etc. |
/ Allen Harper...[et al.]. |
250 ## - EDITION STATEMENT |
Edition statement |
3rd Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Name of publisher, distributor, etc. |
McGraw-Hill Education (India) Pvt. Ltd. |
Place of publication, distribution, etc. |
Chennai |
Date of publication, distribution, etc. |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Other physical details |
Book |
Extent |
xxiv, 693p. : ill. ; |
Dimensions |
24cm |
500 ## - GENERAL NOTE |
General note |
It includes Index pages<br/><br/>THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS<br/><br/>Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.<br/><br/>Develop and launch exploits using BackTrack and Metasploit<br/>Employ physical, social engineering, and insider attack techniques<br/>Build Perl, Python, and Ruby scripts that initiate stack buffer overflows<br/>Understand and prevent malicious content in Adobe, Office, and multimedia files<br/>Detect and block client-side, Web server, VoIP, and SCADA attacks<br/>Reverse engineer, fuzz, and decompile Windows and Linux software<br/>Develop SQL injection, cross-site scripting, and forgery exploits<br/>Trap malware and rootkits using honeypots and SandBoxes |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
9314 |
Topical term or geographic name entry element |
Hackers; Computer security |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
9315 |
Personal name |
Harper, Allen |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.mheducation.co.in/gray-hat-hacking-the-ethical-hackers-handbook-3rd-edition-9780071077316-india#tab-label-product-description-title">https://www.mheducation.co.in/gray-hat-hacking-the-ethical-hackers-handbook-3rd-edition-9780071077316-india#tab-label-product-description-title</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Text Book |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Classification part |
005.8 HAR |