Ethical Hacking: Black Book - 2022 (Record no. 49801)

MARC details
000 -LEADER
fixed length control field 01147 a2200181 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250317145451.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789354570537
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 KHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Khan, Aamer
245 ## - TITLE STATEMENT
Title Ethical Hacking: Black Book - 2022
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Code Academy
Date of publication, distribution, etc 2022
Place of publication, distribution, etc India
300 ## - PHYSICAL DESCRIPTION
Extent 250
520 ## - SUMMARY, ETC.
Summary, etc What is hacking?<br/>A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.<br/>Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground”.<br/>They operate under a code which acknowledges that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally.<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Programming
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ethical hacking
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Source of classification or shelving scheme Dewey Decimal Classification

No items available.