MARC details
| 000 -LEADER |
| fixed length control field |
02391nam a2200301 i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260304084747.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
260227s2023 uk a 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781804612590 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
CSPC |
| Language of cataloging |
eng |
| Transcribing agency |
CSPC |
| Description conventions |
rda |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
.P555 2023 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Item number |
P644e |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Pillay, Rishalin, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Ethical hacking workshop : |
| Remainder of title |
explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity / |
| Statement of responsibility, etc. |
Rishalin Pillay and Mohammed Abutheraa. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
1st edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Birmingham, United Kingdom : |
| Name of producer, publisher, distributor, manufacturer |
Packt Publishing, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2023. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xv, 201 : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Part 1: Network fundamentals -- Networking primer -- Capturing and analyzing network traffic -- Cryptography primer -- Part 2: Breaking and entering -- Reconnaissance -- Scanning -- Gaining access -- Part 3: Total immersion -- Post-exploitation. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"<br/>The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively. Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks. The book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networking"-- Worldcat. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Penetration testing (Computer security). |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Abutheraa, Mohammed, |
| Relator term |
author. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Suppress in OPAC |
No |
| Koha item type |
Books |
| Classification part |
005.8 |
| Item part |
P644e |
| Call number prefix |
CIR |
| Call number suffix |
2023 |
| Edition |
23 |