MARC details
000 -LEADER |
fixed length control field |
01650cam a2200337 i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230302100035.0 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781597499934 (alkaline paper) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
Eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.W544 2013 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wilhelm, Thomas. |
245 10 - TITLE STATEMENT |
Title |
Professional penetration testing / |
Statement of responsibility, etc. |
Thomas Wilhelm, Matthew Neely, technical editor. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Amsterdam : |
Name of producer, publisher, distributor, manufacturer |
Syngress, an imprint of Elsevier, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2013] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
<1> volumes : |
Other physical details |
illustrations ; |
Dimensions |
25 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
Content type code |
txt |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
Media type code |
n |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
Carrier type code |
nc |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 433-434) and index. |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Volume 1. Creating and Learning in a Hacking Lab. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting, and management practices |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Testing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |