Hacking : (Record no. 39127)

MARC details
000 -LEADER
fixed length control field 01683nam a22003017a 4500
001 - CONTROL NUMBER
control field 32844
003 - CONTROL NUMBER IDENTIFIER
control field BD-DhAAL
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240519144303.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180319t2017 xxua|||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781541335189
040 ## - CATALOGING SOURCE
Original cataloging agency BD-DhAAL
Transcribing agency BD-DhAAL
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Norman, Alan T.
9 (RLIN) 25161
245 ## - TITLE STATEMENT
Title Hacking :
Remainder of title computer hacking beginners guide how to hack wireless network, basic security and penetration testing, kali linux, your first hack /
Statement of responsibility, etc Alan T. Norman.
246 ## - VARYING FORM OF TITLE
Title proper/short title Computer hacking beginners guide how to hack wireless network, basic security and penetration testing, Kali Linux, your first hack
264 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT.REV)
Place of publication, distribution, etc [United States] :
Name of publisher, distributor, etc. [publisher not identified],
Date of publication, distribution,etc ©2017.
300 ## - PHYSICAL DESCRIPTION
Extent 152 unnumbered pages ;
Dimensions 23 cm.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note What is hacking? -- Vulnerabilities and exploits -- Getting started -- The hacker's toolkit -- Gaining access -- Malicious activity and code -- Wireless hacking -- Your first hack -- Defensive security & hacker ethics -- Make your own keylogger in C++ -- Setting up the environment -- Setting the eclipse environment: -- Programming basics (Crash course on C++) -- Typical program -- Pointers and files -- Basic keylogger -- Upper and lower case letters -- Encompassing other characters -- Hide keylogger console window.
520 ## - SUMMARY, ETC.
Summary, etc This book covers the basics of everything you need to know about hacking.
526 ## - STUDY PROGRAM INFORMATION NOTE
Program name CSE
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 25162
Topical term or geographic name as entry element Hacking.
9 (RLIN) 25163
Topical term or geographic name as entry element Computer programming.
9 (RLIN) 25164
Topical term or geographic name as entry element Computer science.
9 (RLIN) 42427
852 ## - LOCATION/CALL NUMBER
Location Ayesha Abed Library
Shelving location General Stacks
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Copy number Cost, replacement price Price effective from Koha item type
  Lost and Paid For Dewey Decimal Classification     Ayesha Abed Library Ayesha Abed Library General Stacks 18/03/2018 Karim International 1369.00 19 99 005.8 NOR 3010032844 24/02/2024 10/04/2023 1 1369.00 18/03/2018 Book
  Missing Dewey Decimal Classification     Ayesha Abed Library Ayesha Abed Library General Stacks 18/03/2018 Karim International 1369.00 4 51 005.8 NOR 3010032845 18/11/2019 27/08/2019 2 1369.00 18/03/2018 Book