Hacking exposed malware & root kits : (Record no. 16922)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01227cam a2200253 a 4500 |
001 - CONTROL NUMBER | |
control field | a3233 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | SIRSI |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 090331s2010 nyua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071591188 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0071591184 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Sirsi) i9780071591188 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | D38 2010 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition information | 22 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Davis, Michael A. |
245 10 - TITLE STATEMENT | |
Title | Hacking exposed malware & root kits : |
Remainder of title | malware & rootkits security secrets & solutions / |
Statement of responsibility, etc. | Michael Davis, Sean Bodmer, Aaron Lemasters. |
246 3# - VARYING FORM OF TITLE | |
Title proper/short title | Hacking exposed malware and rootkits. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New York |
Name of publisher, distributor, etc. | McGraw Hill, |
Date of publication, distribution, etc. | c2010. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxii, 377 p. : |
Other physical details | ill. ; |
Dimensions | 23 cm. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Pt. I, Malware. Method of infection ; Malware functionality -- Pt. II, Rootkits. User-mode rootkits ; Kernel-mode rootkits ; Virtual rootkits ; The future of rootkits : if you think it's bad now -- Pt. III, Prevention technologies. Antivirus ; Host protection systems ; Host-based intrusion prevention ; Rootkit detection ; General security practices -- Appendix. System integrity analysis : building your own rootkit detector. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Bodmer, Sean. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | LeMasters, Aaron. |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | AUE Library Collection | MAIN | MAIN | General | QA76.9 .A25 D378 2010 | 10024151 | 03/13/2021 | 1 | 11/19/2019 | Books | |||||
Library of Congress Classification | AUE Library Collection | MAIN | MAIN | General | QA76.9 .A25 D378 2010 | 10024111 | 03/13/2021 | 2 | 11/19/2019 | Books |