MARC details
| 000 -LEADER |
| fixed length control field |
02806cam a2200493Ii 4500 |
| 001 - CONTROL NUMBER |
| control field |
904597568 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20181208084020.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr unu|||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
150310s2015 nyua ob 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780071838504 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0071838503 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Cancelled/invalid ISBN |
9780071832380 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Cancelled/invalid ISBN |
0071832386 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)904597568 |
| 037 ## - SOURCE OF ACQUISITION |
| Stock number |
CL0500000566 |
| Source of stock number/acquisition |
Safari Books Online |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UMI |
| Language of cataloging |
eng |
| Description conventions |
rda |
| -- |
pn |
| Transcribing agency |
UMI |
| Modifying agency |
STF |
| -- |
B24X7 |
| -- |
COO |
| -- |
OH1 |
| -- |
UtOrBLW |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
OH1A |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Regalado, Daniel, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Gray hat hacking : |
| Remainder of title |
the ethical hacker's handbook / |
| Statement of responsibility, etc |
Daniel Regalado [and 7 others]. |
| 246 30 - VARYING FORM OF TITLE |
| Title proper/short title |
Ethical hacker's handbook. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Fourth edition. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New York : |
| Name of publisher, distributor, etc |
McGraw-Hill Education, |
| Date of publication, distribution, etc |
2015 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (1 volume) : |
| Other physical details |
illustrations. |
| 336 ## - CONTENT TYPE |
| Content Type Term |
text |
| Content Type Code |
txt |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media Type Term |
computer |
| Media Type Code |
c |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier Type Term |
online resource |
| Carrier Type Code |
cr |
| Source |
rdacarrier. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 506 ## - RESTRICTIONS ON ACCESS NOTE |
| Terms governing access |
Available to OhioLINK libraries. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. -- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Hackers. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Hacking. |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 655 #0 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
Ohio Library and Information Network. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Display text |
Print version : |
| Main entry heading |
Regalado, Daniel. |
| Title |
Gray hat hacking. |
| Edition |
Fourth edition. |
| Place, publisher, and date of publication |
New York : McGraw-Hill, [2015] |
| International Standard Book Number |
9780071832380 |
| Record control number |
(OCoLC)900478166. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Safari Books Online |
| Uniform Resource Identifier |
<a href="http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9780071832380">http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9780071832380</a> |
| Public note |
Connect to resource |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Safari Books Online |
| Uniform Resource Identifier |
<a href="http://proxy.ohiolink.edu:9099/login?url=http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9780071832380">http://proxy.ohiolink.edu:9099/login?url=http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9780071832380</a> |
| Public note |
Connect to resource (off-campus) |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Item type |
Books |