MARC details
000 -LEADER |
fixed length control field |
03282cam a2200481 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230825092505.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100901s2010 nyua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010027293 |
011 ## - LINKING LIBRARY OF CONGRESS CONTROL NUMBER [OBSOLETE] |
Local cataloguing issues note |
ATTENTION: Field 082 : DDC value 005.8 clashes with held titles : [BIB: 1273000 Hacking exposed wireless / Cache, Johnny.(McGraw-Hill, 2007.) - DDC: 621.382]. |
011 ## - LINKING LIBRARY OF CONGRESS CONTROL NUMBER [OBSOLETE] |
Local cataloguing issues note |
BIB MATCHES WORLDCAT |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071666613 |
Qualifying information |
alk. paper |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071666619 |
Qualifying information |
alk. paper |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(ATU)b11743049 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)640078077 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
BTCTA |
-- |
YDXCP |
-- |
UKM |
-- |
C#P |
-- |
BWX |
-- |
EINCP |
-- |
ATU |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5103.2 |
Item number |
.C23 2010 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.382 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Cache, Johnny, |
Relator term |
author. |
9 (RLIN) |
1080603 |
245 10 - TITLE STATEMENT |
Title |
Hacking exposed wireless : |
Remainder of title |
wireless security secrets & solutions / |
Statement of responsibility, etc. |
Johnny Cache, Joshua Wright, Vincent Liu. |
246 30 - VARYING FORM OF TITLE |
Title proper/short title |
Wireless |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York : |
Name of producer, publisher, distributor, manufacturer |
McGraw-Hill, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2010] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2010 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxv, 484 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Hacking exposed |
500 ## - GENERAL NOTE |
General note |
A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com . |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
PART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4] |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Machine converted from AACR2 source record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless communication systems |
General subdivision |
Security measures |
9 (RLIN) |
812076 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless LANs |
General subdivision |
Security measures |
9 (RLIN) |
812055 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Wright, Joshua, |
Relator term |
author. |
9 (RLIN) |
1080604 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Liu, Vincent, |
Relator term |
author. |
9 (RLIN) |
1080605 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Hacking exposed. |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
a |
.b11743049 |
b |
11-07-17 |
c |
27-10-15 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Book |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) |
a |
621.382 CAC |
g |
1 |
i |
A454660B |
j |
0 |
l |
cmain |
o |
- |
p |
$74.75 |
q |
- |
r |
- |
s |
- |
t |
0 |
u |
5 |
v |
0 |
w |
0 |
x |
1 |
y |
.i13050588 |
z |
29-10-15 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
-- |
b |
-- |
c |
Operator's initials, OID (RLIN) |
06-04-16 |
Cataloger's initials, CIN (RLIN) |
m |
First date, FD (RLIN) |
a |
-- |
eng |
-- |
nyu |
-- |
0 |