The hacker playbook 2 : (Record no. 156314)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 00783nam a22002537a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230406020003.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210125b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781512214567 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | IIITD |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | KIM-H |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kim, Peter |
245 ## - TITLE STATEMENT | |
Title | The hacker playbook 2 : |
Remainder of title | practical guide to penetration testing |
Statement of responsibility, etc | by Peter Kim |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | CreateSpace, |
Place of publication, distribution, etc | North Charleston : |
Date of publication, distribution, etc | ©2015 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv, 339 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Penetration testing (Computer security) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes--Prevention |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Hackers |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer software--Testing |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer programming |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Koha issues (borrowed), all copies | 8 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Bill No. | Bill Date | Cost, normal purchase price | PO No. | PO Date | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Cost, replacement price | Price effective from | Vendor/Supplier | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Not for loan | Computer Science and Engineering | IIITD | IIITD | Reference | 25/01/2021 | IN-QNBE-2670645 | 2021-01-22 | 1769.00 | IIITD/LIC/BS/2019/AMZ/39 | 2021-01-22 | 8 | 19 | REF 005.8 KIM-H | 010402 | 16/06/2023 | 05/04/2023 | 1929.00 | 25/01/2021 | Amazon.in | Reference |