| 000 -LEADER |
| fixed length control field |
02197fam a2200325 a 4500 |
| 001 - CONTROL NUMBER |
| control field |
2293253 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20100221102916.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
981030s1997 inua b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
8176350397 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)40122271 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)ocm40122271 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(NNC)2293253 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Transcribing agency |
DLC |
| Modifying agency |
OrLoB-B |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
M39 1997 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
21 |
| 245 00 - TITLE STATEMENT |
| Title |
Maximum security : |
| Remainder of title |
a hacker's guide to protecting your Internet site and network / |
| Statement of responsibility, etc |
Anonymous. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
2nd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New Delhi : |
| Name of publisher, distributor, etc |
Techmedia, |
| Date of publication, distribution, etc |
1997. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxi, 885 p. : |
| Other physical details |
ill. ; |
| Dimensions |
23 cm. + |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 00 - FORMATTED CONTENTS NOTE |
| Miscellaneous information |
I. |
| Title |
Setting the Stage. |
| Miscellaneous information |
1. |
| Title |
Why Did I Write This Book? |
| Miscellaneous information |
2. |
| Title |
How to Use This Book -- |
| Miscellaneous information |
II. |
| Title |
Understanding the Terrain. |
| Miscellaneous information |
3. |
| Title |
Birth of a Network: The Internet. |
| Miscellaneous information |
4. |
| Title |
A Brief Primer on TCP/IP. |
| Miscellaneous information |
5. |
| Title |
Hackers and Crackers. |
| Miscellaneous information |
6. |
| Title |
Just Who Can Be Hacked, Anyway? |
| Miscellaneous information |
7. |
| Title |
Internet Warfare. |
| Miscellaneous information |
8. |
| Title |
Security Concepts -- |
| Miscellaneous information |
III. |
| Title |
Tools. |
| Miscellaneous information |
9. |
| Title |
Destructive Devices. |
| Miscellaneous information |
10. |
| Title |
Scanners. |
| Miscellaneous information |
11. |
| Title |
Password Crackers. |
| Miscellaneous information |
12. |
| Title |
Trojans. |
| Miscellaneous information |
13. |
| Title |
Sniffers. |
| Miscellaneous information |
14. |
| Title |
Firewalls. |
| Miscellaneous information |
15. |
| Title |
Logging and Audit Tools -- |
| Miscellaneous information |
IV. |
| Title |
Platforms and Security. |
| Miscellaneous information |
16. |
| Title |
The Hole. |
| Miscellaneous information |
17. |
| Title |
Microsoft. |
| Miscellaneous information |
18. |
| Title |
UNIX: The Big Kahuna. |
| Miscellaneous information |
19. |
| Title |
Novell. |
| Miscellaneous information |
20. |
| Title |
VAX/VMS. |
| Miscellaneous information |
21. |
| Title |
Macintosh -- |
| Miscellaneous information |
V. |
| Title |
Beginning at Ground Zero. |
| Miscellaneous information |
22. |
| Title |
Who's in Charge? |
| Miscellaneous information |
23. |
| Title |
Internal Security -- |
| Miscellaneous information |
VI. |
| Title |
The Remote Attack. |
| Miscellaneous information |
24. |
| Title |
The Remote Attack. |
| Miscellaneous information |
25. |
| Title |
Levels of Attack. |
| Miscellaneous information |
26. |
| Title |
Spoofing Attacks. |
| Miscellaneous information |
27. |
| Title |
Telnet-Based Attacks. |
| Miscellaneous information |
28. |
| Title |
Languages, Extensions, and Security. |
| Miscellaneous information |
29. |
| Title |
Hiding Your Identity -- |
| Miscellaneous information |
VII. |
| Title |
Appendixes -- |
| Miscellaneous information |
A. |
| Title |
Security Bibliography - Further Reading -- |
| Miscellaneous information |
B. |
| Title |
How to Get More Information -- |
| Miscellaneous information |
C. |
| Title |
Security Consultants -- |
| 505 80 - FORMATTED CONTENTS NOTE |
| Miscellaneous information |
D. |
| Title |
Reference Documents Linked on the CD-ROM -- |
| Miscellaneous information |
E. |
| Title |
Reality Bytes: Computer Security and the Law. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 9 (RLIN) |
424 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
10326 |
| 900 ## - EQUIVALENCE OR CROSS-REFERENCE-PERSONAL NAME [LOCAL, CANADA] |
| Numeration |
TOC |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
|
| Koha item type |
Books |