MARC details
000 -LEADER |
fixed length control field |
01683nam a22003017a 4500 |
001 - CONTROL NUMBER |
control field |
32844 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BD-DhAAL |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240519144303.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180319t2017 xxua|||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781541335189 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BD-DhAAL |
Transcribing agency |
BD-DhAAL |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Norman, Alan T. |
9 (RLIN) |
25161 |
245 ## - TITLE STATEMENT |
Title |
Hacking : |
Remainder of title |
computer hacking beginners guide how to hack wireless network, basic security and penetration testing, kali linux, your first hack / |
Statement of responsibility, etc |
Alan T. Norman. |
246 ## - VARYING FORM OF TITLE |
Title proper/short title |
Computer hacking beginners guide how to hack wireless network, basic security and penetration testing, Kali Linux, your first hack |
264 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT.REV) |
Place of publication, distribution, etc |
[United States] : |
Name of publisher, distributor, etc. |
[publisher not identified], |
Date of publication, distribution,etc |
©2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
152 unnumbered pages ; |
Dimensions |
23 cm. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
What is hacking? -- Vulnerabilities and exploits -- Getting started -- The hacker's toolkit -- Gaining access -- Malicious activity and code -- Wireless hacking -- Your first hack -- Defensive security & hacker ethics -- Make your own keylogger in C++ -- Setting up the environment -- Setting the eclipse environment: -- Programming basics (Crash course on C++) -- Typical program -- Pointers and files -- Basic keylogger -- Upper and lower case letters -- Encompassing other characters -- Hide keylogger console window. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book covers the basics of everything you need to know about hacking. |
526 ## - STUDY PROGRAM INFORMATION NOTE |
Program name |
CSE |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
25162 |
|
Topical term or geographic name as entry element |
Hacking. |
9 (RLIN) |
25163 |
|
Topical term or geographic name as entry element |
Computer programming. |
9 (RLIN) |
25164 |
|
Topical term or geographic name as entry element |
Computer science. |
9 (RLIN) |
42427 |
852 ## - LOCATION/CALL NUMBER |
Location |
Ayesha Abed Library |
Shelving location |
General Stacks |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Item type |
Book |