Scientific Information Resource Centre, NCRA-TIFR

Maximum security : (Record no. 6846)

000 -LEADER
fixed length control field 02197fam a2200325 a 4500
001 - CONTROL NUMBER
control field 2293253
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20100221102916.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 981030s1997 inua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 8176350397
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)40122271
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocm40122271
035 ## - SYSTEM CONTROL NUMBER
System control number (NNC)2293253
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency OrLoB-B
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number M39 1997
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
245 00 - TITLE STATEMENT
Title Maximum security :
Remainder of title a hacker's guide to protecting your Internet site and network /
Statement of responsibility, etc Anonymous.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Techmedia,
Date of publication, distribution, etc 1997.
300 ## - PHYSICAL DESCRIPTION
Extent xxxi, 885 p. :
Other physical details ill. ;
Dimensions 23 cm. +
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 00 - FORMATTED CONTENTS NOTE
Miscellaneous information I.
Title Setting the Stage.
Miscellaneous information 1.
Title Why Did I Write This Book?
Miscellaneous information 2.
Title How to Use This Book --
Miscellaneous information II.
Title Understanding the Terrain.
Miscellaneous information 3.
Title Birth of a Network: The Internet.
Miscellaneous information 4.
Title A Brief Primer on TCP/IP.
Miscellaneous information 5.
Title Hackers and Crackers.
Miscellaneous information 6.
Title Just Who Can Be Hacked, Anyway?
Miscellaneous information 7.
Title Internet Warfare.
Miscellaneous information 8.
Title Security Concepts --
Miscellaneous information III.
Title Tools.
Miscellaneous information 9.
Title Destructive Devices.
Miscellaneous information 10.
Title Scanners.
Miscellaneous information 11.
Title Password Crackers.
Miscellaneous information 12.
Title Trojans.
Miscellaneous information 13.
Title Sniffers.
Miscellaneous information 14.
Title Firewalls.
Miscellaneous information 15.
Title Logging and Audit Tools --
Miscellaneous information IV.
Title Platforms and Security.
Miscellaneous information 16.
Title The Hole.
Miscellaneous information 17.
Title Microsoft.
Miscellaneous information 18.
Title UNIX: The Big Kahuna.
Miscellaneous information 19.
Title Novell.
Miscellaneous information 20.
Title VAX/VMS.
Miscellaneous information 21.
Title Macintosh --
Miscellaneous information V.
Title Beginning at Ground Zero.
Miscellaneous information 22.
Title Who's in Charge?
Miscellaneous information 23.
Title Internal Security --
Miscellaneous information VI.
Title The Remote Attack.
Miscellaneous information 24.
Title The Remote Attack.
Miscellaneous information 25.
Title Levels of Attack.
Miscellaneous information 26.
Title Spoofing Attacks.
Miscellaneous information 27.
Title Telnet-Based Attacks.
Miscellaneous information 28.
Title Languages, Extensions, and Security.
Miscellaneous information 29.
Title Hiding Your Identity --
Miscellaneous information VII.
Title Appendixes --
Miscellaneous information A.
Title Security Bibliography - Further Reading --
Miscellaneous information B.
Title How to Get More Information --
Miscellaneous information C.
Title Security Consultants --
505 80 - FORMATTED CONTENTS NOTE
Miscellaneous information D.
Title Reference Documents Linked on the CD-ROM --
Miscellaneous information E.
Title Reality Bytes: Computer Security and the Law.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 424
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
9 (RLIN) 10326
900 ## - EQUIVALENCE OR CROSS-REFERENCE-PERSONAL NAME [LOCAL, CANADA]
Numeration TOC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Copy number Price effective from Koha item type
          National Centre for Radio Astrophysics National Centre for Radio Astrophysics General Stacks 1998-11-24 Popular Book House ( Bill. No. 395 Date : 24-11-1998) 449.10 681.324/ANO 10849 2011-02-06 10849 2011-02-06 Books