Ethical hacking : (Record no. 18964)

MARC details
000 -LEADER
fixed length control field 01933cam a2200277 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250421080555.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240214s2024 mau b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284248999 (paperback)
037 ## - SOURCE OF ACQUISITION
Source of stock number/acquisition SBF2023
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
-- AE-Shu
Transcribing agency UKB
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .O786 2024
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Solomon, Michael
Fuller form of name (Michael G.),
Dates associated with a name 1963-
Relator term author.
240 10 - UNIFORM TITLE
Uniform title Hacker techniques, tools, and incident handling
245 10 - TITLE STATEMENT
Title Ethical hacking :
Remainder of title techniques, tools, and countermeasures /
Statement of responsibility, etc. Michael G. Solomon, Sean-Philip Oriyano.
250 ## - EDITION STATEMENT
Edition statement Fourth edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington, Massachusetts :
Name of publisher, distributor, etc. Jones & Bartlett Learning,
Date of publication, distribution, etc. [2024]
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 413 pages ;
Dimensions 24 cm
365 ## - TRADE PRICE
Price amount 404.00
Currency code AED
500 ## - GENERAL NOTE
General note Previous edition: Hacker techniques, tools, and incident handling. Third edition. Burlington, MA : Jones & Bartlett Learning, 2020.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Ethical Hacking covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen-testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies the tools and methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. This title is can be aligned to EC Council's Certified Ethical Hacker in terms of scope (but not rigor)"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Oriyano, Sean-Philip,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Loanable University of Kalba University of Kalba 2014-02-24 SBF2023 i15652385   TK5105.59 .O786 2024 00-1-364883 2025-04-21 2025-04-21 Books

© 2025 University of Kalba. All Rights Reserved.