Hacking exposed : (Record no. 56809)

MARC details
000 -LEADER
fixed length control field 01936 a2200277 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210812b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071823074
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071823074 020 0071823077
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number E39 2017
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Elisan, Christopher C.
245 ## - TITLE STATEMENT
Title Hacking exposed :
Remainder of title malware and rootkits : security secrets & solutions /
Statement of responsibility, etc Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
250 ## - EDITION STATEMENT
Edition statement 2nd
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc McGraw-Hill Education,
Date of publication, distribution, etc 2017
Place of publication, distribution, etc New York :
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 360 pages :
Other physical details illustrations ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Revised edition of: Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters. 2010
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Includes index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Part I : Malware. Malware propagation -- Malware functionality -- Part II : Rootkits. User-mode rootkits -- Kernel-mode rootkits -- Virtual rootkits -- The future of rootkits -- Part III : Prevention technologies. Antivirus -- Host protection systems -- Host-based intrusion prevention -- Rootkit detection -- General security practices
520 ## - SUMMARY, ETC.
Summary, etc "Fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop -up and phising exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology."--Back cover
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element 650 0 Computer networks|xSecurity measures 650 0 Malware (Computer software) 650 0 Rootkits (Computer software)
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Davis, Michael,
Dates associated with a name 1982-
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Bodmer, Sean,
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name LeMasters, Aaron,
760 ## - MAIN SERIES ENTRY
Edition Online version:|aDavis, Michael, 1982-|tHacking exposed. |dNew York : McGraw-Hill Education, [2017]|z9780071825757 |w(DLC) 2016049606
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Book
Source of classification or shelving scheme Library of Congress Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Copy number Price effective from Koha item type
    Library of Congress Classification     Non-fiction Bishop Okullu Memorial Library (Limuru Campus) Bishop Okullu Memorial Library (Limuru Campus) General Circulation 12/08/2021 PURCHASE 5018.00 7 1 QA76.9.A25 E39 2017 066475 23/04/2025 08/04/2025 1 12/08/2021 Book
    Library of Congress Classification     Non-fiction Nairobi Campus Nairobi Campus Processing Center 12/08/2021 PURCHASE 5018.00 4 1 QA76.9.A25 E39 2017 066476 06/10/2025 26/09/2025 2 12/08/2021 Book