Anti-Hacker Tool Kit (Record no. 24989)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02482nam a22002177a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200310141531.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190113b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789339212155 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23rd |
Classification number | 005.8 SHE |
100 ## - MAIN ENTRY--PERSONAL NAME | |
9 (RLIN) | 9333 |
Personal name | Shema, Mike |
245 ## - TITLE STATEMENT | |
Title | Anti-Hacker Tool Kit |
Statement of responsibility, etc. | / Mike Shema |
250 ## - EDITION STATEMENT | |
Edition statement | 4th Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Chennai |
Name of publisher, distributor, etc. | McGraw Hill Education (India) Pvt. Ltd. |
Date of publication, distribution, etc. | 2018 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxii, 601p. : ill. ; |
Dimensions | 24cm |
500 ## - GENERAL NOTE | |
General note | It includes index<br/><br/>Defend against today's most devious attacks<br/><br/>Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.<br/><br/>Demonstrates how to configure and use these and other essential tools:<br/><br/> Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options<br/> Vulnerability scanners: OpenVAS, Metasploit<br/> File system monitors: AIDE, Samhain, Tripwire<br/> Windows auditing tools: Nbtstat, Cain, MBSA, PsTools<br/> Command-line networking tools: Netcat, Cryptcat, Ncat, Socat<br/> Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay<br/> Port scanners: Nmap, THC-Amap<br/> Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort<br/> Network defenses: firewalls, packet filters, and intrusion detection systems<br/> War dialers: ToneLoc, THC-Scan, WarVOX<br/> Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap<br/> Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra<br/> Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion<br/> Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 9334 |
Topical term or geographic name entry element | Data Protection; Computer Networks-Security Measures; |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://www.mheducation.co.in/anti-hacker-tool-kit-fourth-edition-9789339212155-india">https://www.mheducation.co.in/anti-hacker-tool-kit-fourth-edition-9789339212155-india</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Reference Book |
Classification part | 005.8 SHE |
Withdrawn status | Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Use restrictions | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Paper Back | Restricted Access | Not For Loan | Reference | School of Computer Science Section | VIT-AP | General Stacks | 2018-12-15 | Jaico Publishing House | 930.00 | SINV04049 | 005.8 SHE | 013165 | 2019-01-13 | 2019-01-13 | Reference Book | CSE |