Certified ethical hacker (CEH) hacking users and their devices : (Record no. 576523)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02591nkm a2200433Ia 4500 |
001 - CONTROL NUMBER | |
control field | ocn984829439 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20180530140259.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o c |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cna|||||||| |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | vz czazuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170428s2017 xx 212 o vleng d |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)984829439 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | CL0500000853 |
Source of stock number/acquisition | Safari Books Online |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DLC |
Modifying agency | Safari Books Online, LLC |
-- | AU |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | Alfaisal Main Library |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Russell, Chad, |
Relator term | speaker. |
245 10 - TITLE STATEMENT | |
Title | Certified ethical hacker (CEH) hacking users and their devices : |
Remainder of title | understanding social engineering attacks, malware deployment, Wi-Fi network penetration, and hacking into Android and iOS devices / |
Statement of responsibility, etc | with Chad Russell. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS | |
Place of production, publication, distribution, manufacture | [Place of publication not identified] : |
Name of producer, publisher, distributor, manufacturer | O'Reilly, |
Date of production, publication, distribution, manufacture | [2017] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Date of publication, distribution, etc | [2017] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (1 streaming video file (3 hr., 31 min., 3 sec.)) : |
Other physical details | digital, sound, color |
336 ## - CONTENT TYPE | |
Content Type Term | two-dimensional moving image |
Content Type Code | tdi |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media Type Term | computer |
Media Type Code | c |
Source | rdamedia |
337 ## - MEDIA TYPE | |
Media Type Term | video |
Media Type Code | v |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier Type Term | online resource |
Carrier Type Code | cr |
Source | rdacarrier |
511 0# - PARTICIPANT OR PERFORMER NOTE | |
Participant or performer note | Presenter, Chad Russell. |
500 ## - GENERAL NOTE | |
General note | Title from title screen (viewed April 27, 2017). |
500 ## - GENERAL NOTE | |
General note | Date of publication from resource description page. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "This is part two of the four-part series that prepares you to pass the International Council of E-Commerce Consultants Certified Ethical Hacker (CEH) exam. In this course, you'll gain hands-on experience with the techniques and tools used to compromise user devices and systems as part of sanctioned penetration testing exercises. Designed for IT analysts or engineers with CCNA level knowledge of TCP/IP networking concepts; the course covers social engineering attacks, malware attacks and counter measures, Wi-Fi network penetration techniques using tools like Aircrack and Reaver, methods for hacking Android and iOS devices, and practices you can use to deploy Trojan viruses to better understand how attackers compromise systems."--Resource description page. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
General subdivision | Examinations |
Form subdivision | Study guides. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Penetration testing (Computer security) |
General subdivision | Examinations |
Form subdivision | Study guides. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Hackers |
General subdivision | Examinations |
Form subdivision | Study guides. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures |
-- | Examinations |
Form subdivision | Study guides. |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | local |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | Safari eBooks. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=9781491975763">http://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=9781491975763</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | eBooks |
994 ## - | |
-- | C0 |
-- | UMI |
No items available.