The hacker playbook 3 : (Record no. 156317)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 00737nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20231103020002.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210217b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781980901754 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | IIITD |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | KIM-H |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kim, Peter |
245 ## - TITLE STATEMENT | |
Title | The hacker playbook 3 : |
Remainder of title | practical guide to penetration testing |
Statement of responsibility, etc | by Peter Kim |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | CreateSpace, |
Place of publication, distribution, etc | New York : |
Date of publication, distribution, etc | ©2018 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | ix, 271 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer software--Testing |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Penetration testing (Computer security) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes--Prevention |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer programming |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Hackers |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Koha issues (borrowed), all copies | 2 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Bill No. | Bill Date | Cost, normal purchase price | PO No. | PO Date | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Cost, replacement price | Price effective from | Vendor/Supplier | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Computer Science and Engineering | IIITD | IIITD | Reference | 16/02/2021 | IN-DEL5-17143076 | 2021-02-13 | 2155.00 | IIITD/LIC/BS/2019/AMZ/41 | 2021-02-12 | 2 | 5 | REF 005.8 KIM-H | 010436 | 17/11/2023 | 02/11/2023 | 2276 | 16/02/2021 | Amazon.in | Reference |