An Unofficial Guide to Ethical Hacking (Record no. 1812)

MARC details
000 -LEADER
fixed length control field 02245nam a2200205Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field RRU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240209142902.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210901b ||||||||| ||||||| u|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781403929648
Printed Price Rs.395.00
040 ## - CATALOGING SOURCE
Original cataloging agency RRU
Language of cataloging English
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Class No. 005.8
Item number FAD
100 ## - FIRST AUTHOR (IF A PERSON)
9 (RLIN) 8443
Name of author Fadia Ankit
245 #3 - TITLE STATEMENT
Title An Unofficial Guide to Ethical Hacking
Statement of responsibility Fadia Ankit
250 ## - EDITION STATEMENT
Edition statement 2nd Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Macmillan Publication
Place of publication, distribution, etc. Delhi
Date of publication, distribution, etc. 2014
300 ## - PHYSICAL DESCRIPTION
No. of pages 589p.
520 ## - SUMMARY, ETC.
Summary, etc. The Unofficial Guide To Ethical Hacking helps you to protect your system from such attacks. This book makes you differentiate between hackers and crackers. Hackers are those who search for and take advantage of weak points in a computer system, while crackers ‘breaks’ someone else’s computer system. Crackers can damage your system by passing a virus into your computer system.<br/><br/>By reading this book, you can update yourself about the different hacking techniques, and protect your system better. This book covers vital and comprehensive information and methods about network hacking, and attacks of input validation, overflow, privacy, and Denial Of Services (DOS). It also includes information about the most common exploits, vulnerabilities, loopholes, and many more vital topics.<br/><br/>The Unofficial Guide To Ethical Hacking starts with the introduction of what a hacker is, hacking windows, information about hacking related to networks, the web, and passwords, attacks of input validation, buffer overflow, and privacy. You can also learn a mammoth description of TCP/IP, DOS attacks, cryptography, firewalls, and error messages. This book also provides the description of batch file programming, viruses torn apart, and readers also get know about the working of viruses.<br/><br/>The Unofficial Guide To Ethical Hacking is not only a guide to hacking, but it also explains other aspects related to computer security. The second edition of this book was published by Macmillan India Ltd in 2006 and available in paperback.<br/><br/>Key Features:<br/><br/>Case studies are included in this book, which helps in understanding the theory in the book easily.<br/>Methods and information of this book are updated and explained in a step-by-step pattern.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan (e.g. reference copy) Home library Current library Date acquired Inventory number Total Checkouts Full call number Accession No Date last seen Date last checked out Item MRP (printed price) Price effective from Koha item type
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 23/06/2011 02233 1 005.8 FAD 2233 09/02/2024 28/06/2023 395.00 02/09/2021 Books
© 2024 Rashtriya Raksha University, All Rights Reserved.