Hacking exposed wireless : (Record no. 1468)

MARC details
000 -LEADER
fixed length control field 01805cam a2200337 a 4500
001 - CONTROL NUMBER
control field 16334195
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20131008124702.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100715s2010 ii a g b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010027293
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB069693
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015571691
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071070911 (pbk)
040 ## - CATALOGING SOURCE
Transcribing agency NCL
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number CAC-H 2010 2081
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Cache, Johnny.
245 10 - TITLE STATEMENT
Title Hacking exposed wireless :
Remainder of title wireless security secrets & solutions /
Statement of responsibility, etc. by Johnny Cache, Joshua Wright, Vincent Liu.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New Delhi :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 484 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Hacking exposed
500 ## - GENERAL NOTE
General note Index included
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless communication systems
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless LANs
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wright, Joshua.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liu, Vincent.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Price effective from Koha item type
          Namal Library Namal Library Computer Science 10/08/2013 3 2 005.8 CAC-H 2010 2081 0002081 10/13/2021 08/25/2021 10/08/2013 Books