MARC details
000 -LEADER |
fixed length control field |
02634cam a2200469 i 4500 |
001 - CONTROL NUMBER |
control field |
15045036 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230528014325.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
071015s2008 caua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2007042910 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781593271442 |
Qualifying information |
paperback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1593271441 |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn175218338 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)175218338 |
Canceled/invalid control number |
(OCoLC)148663724 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
BTCTA |
-- |
BAKER |
-- |
YDXCP |
-- |
C#P |
-- |
EG-CaTKH |
Description conventions |
rda |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
E75 2008 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 ER.H 2008 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Erickson, Jon, |
Dates associated with a name |
1977- |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Hacking : |
Remainder of title |
the art of exploitation / |
Statement of responsibility, etc. |
Jon Erickson. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
California : |
Name of producer, publisher, distributor, manufacturer |
William Pollock, |
Date of production, publication, distribution, manufacture, or copyright notice |
2008. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
x, 472 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm + |
Accompanying material |
1 CD-ROM (4 3/4 in.) |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
Materials specified |
book |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
Materials specified |
CD-ROM |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
Materials specified |
book |
337 ## - MEDIA TYPE |
Source |
computer |
Media type term |
c |
Media type code |
rdamedia |
Materials specified |
CD-ROM |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
Materials specified |
book |
338 ## - CARRIER TYPE |
Carrier type term |
computer disc |
Carrier type code |
cd |
Source |
rdacarrier |
Materials specified |
CD-ROM |
500 ## - GENERAL NOTE |
General note |
CD-ROM in back pocket. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index and link to CD contents. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Programming -- Exploitation -- Networking -- Shellcode -- Countermeasures. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. All sections have been extensively updated and expanded, including a more thorough introduction to the complex, low-level workings of a computer. Readers can easily follow along with example code by booting the included live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1137538&query=Hacking+%3A+the+art+of+exploitation+">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1137538&query=Hacking+%3A+the+art+of+exploitation+</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022027 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20220208 |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |