Hacking : (Record no. 228)

MARC details
000 -LEADER
fixed length control field 02634cam a2200469 i 4500
001 - CONTROL NUMBER
control field 15045036
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230528014325.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071015s2008 caua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2007042910
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781593271442
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1593271441
Qualifying information paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn175218338
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)175218338
Canceled/invalid control number (OCoLC)148663724
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency BTCTA
-- BAKER
-- YDXCP
-- C#P
-- EG-CaTKH
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number E75 2008
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 ER.H 2008
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Erickson, Jon,
Dates associated with a name 1977-
Relator term author.
245 10 - TITLE STATEMENT
Title Hacking :
Remainder of title the art of exploitation /
Statement of responsibility, etc. Jon Erickson.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture California :
Name of producer, publisher, distributor, manufacturer William Pollock,
Date of production, publication, distribution, manufacture, or copyright notice 2008.
300 ## - PHYSICAL DESCRIPTION
Extent x, 472 pages :
Other physical details illustrations ;
Dimensions 23 cm +
Accompanying material 1 CD-ROM (4 3/4 in.)
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
Materials specified book
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
Materials specified CD-ROM
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
Materials specified book
337 ## - MEDIA TYPE
Source computer
Media type term c
Media type code rdamedia
Materials specified CD-ROM
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
Materials specified book
338 ## - CARRIER TYPE
Carrier type term computer disc
Carrier type code cd
Source rdacarrier
Materials specified CD-ROM
500 ## - GENERAL NOTE
General note CD-ROM in back pocket.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index and link to CD contents.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Programming -- Exploitation -- Networking -- Shellcode -- Countermeasures.
520 ## - SUMMARY, ETC.
Summary, etc. While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. All sections have been extensively updated and expanded, including a more thorough introduction to the complex, low-level workings of a computer. Readers can easily follow along with example code by booting the included live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1137538&query=Hacking+%3A+the+art+of+exploitation+">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1137538&query=Hacking+%3A+the+art+of+exploitation+</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name huda.mahmoud
Cataloging process M
First Date, FD (RLIN) 2022027
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20220208
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last checked out Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/12/2020 440.06 2 1 005.8 / ER.H 2008 190253 04/15/2024 04/04/2024 440.06 08/12/2020 Books
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 02/08/2022       005.8 ER.H 2008 210904 02/08/2022     02/08/2022 CDs