Hacking exposed wireless : (Record no. 1468)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01805cam a2200337 a 4500 |
001 - CONTROL NUMBER | |
control field | 16334195 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20131008124702.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100715s2010 ii a g b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2010027293 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBB069693 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 015571691 |
Source | Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071070911 (pbk) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NCL |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | CAC-H 2010 2081 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Cache, Johnny. |
245 10 - TITLE STATEMENT | |
Title | Hacking exposed wireless : |
Remainder of title | wireless security secrets & solutions / |
Statement of responsibility, etc. | by Johnny Cache, Joshua Wright, Vincent Liu. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | McGraw-Hill, |
Date of publication, distribution, etc. | c2010. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxv, 484 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
490 0# - SERIES STATEMENT | |
Series statement | Hacking exposed |
500 ## - GENERAL NOTE | |
General note | Index included |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4] |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Wireless communication systems |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Wireless LANs |
General subdivision | Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Wright, Joshua. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Liu, Vincent. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Namal Library | Namal Library | Computer Science | 10/08/2013 | 3 | 2 | 005.8 CAC-H 2010 2081 | 0002081 | 10/13/2021 | 08/25/2021 | 10/08/2013 | Books |