Certified ethical hacker (CEH) hacking users and their devices : (Record no. 576523)

MARC details
000 -LEADER
fixed length control field 02591nkm a2200433Ia 4500
001 - CONTROL NUMBER
control field ocn984829439
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180530140259.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o c
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cna||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field vz czazuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170428s2017 xx 212 o vleng d
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)984829439
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000853
Source of stock number/acquisition Safari Books Online
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency Safari Books Online, LLC
-- AU
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Alfaisal Main Library
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Russell, Chad,
Relator term speaker.
245 10 - TITLE STATEMENT
Title Certified ethical hacker (CEH) hacking users and their devices :
Remainder of title understanding social engineering attacks, malware deployment, Wi-Fi network penetration, and hacking into Android and iOS devices /
Statement of responsibility, etc with Chad Russell.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Place of production, publication, distribution, manufacture [Place of publication not identified] :
Name of producer, publisher, distributor, manufacturer O'Reilly,
Date of production, publication, distribution, manufacture [2017]
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc [2017]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (1 streaming video file (3 hr., 31 min., 3 sec.)) :
Other physical details digital, sound, color
336 ## - CONTENT TYPE
Content Type Term two-dimensional moving image
Content Type Code tdi
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term computer
Media Type Code c
Source rdamedia
337 ## - MEDIA TYPE
Media Type Term video
Media Type Code v
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term online resource
Carrier Type Code cr
Source rdacarrier
511 0# - PARTICIPANT OR PERFORMER NOTE
Participant or performer note Presenter, Chad Russell.
500 ## - GENERAL NOTE
General note Title from title screen (viewed April 27, 2017).
500 ## - GENERAL NOTE
General note Date of publication from resource description page.
520 ## - SUMMARY, ETC.
Summary, etc "This is part two of the four-part series that prepares you to pass the International Council of E-Commerce Consultants Certified Ethical Hacker (CEH) exam. In this course, you'll gain hands-on experience with the techniques and tools used to compromise user devices and systems as part of sanctioned penetration testing exercises. Designed for IT analysts or engineers with CCNA level knowledge of TCP/IP networking concepts; the course covers social engineering attacks, malware attacks and counter measures, Wi-Fi network penetration techniques using tools like Aircrack and Reaver, methods for hacking Android and iOS devices, and practices you can use to deploy Trojan viruses to better understand how attackers compromise systems."--Resource description page.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hackers
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Examinations
Form subdivision Study guides.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Safari eBooks.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=9781491975763">http://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=9781491975763</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBooks
994 ## -
-- C0
-- UMI

No items available.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu