Violent python : (Record no. 10340)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01518cam a2200325 i 4500 |
001 - CONTROL NUMBER | |
control field | 17494901 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221112020002.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121015s2013 ne b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2012030814 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781597499576 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Transcribing agency | DLC |
Description conventions | rda |
Modifying agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.73.P98 |
Item number | O26 2013 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.133 |
Edition number | 23 |
Item number | OCO-V |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | O'Connor, T. J. |
245 10 - TITLE STATEMENT | |
Title | Violent python : |
Remainder of title | a cookbook for hackers, forensic analysts, penetration testers, and security engineers |
Statement of responsibility, etc | TJ. O'Connor. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | Syngress Media, |
Date of publication, distribution, etc | ©2013. |
Place of publication, distribution, etc | Boston: |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxv, 262 p. ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Python is a hacker's language. With its decreased complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive tools already exist, learning Python can help you with the difficult cases where those tools fail"-- |
600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME | |
Personal name | Python (Computer program language) |
610 ## - SUBJECT ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | Hackers |
630 ## - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security Engineers |
648 ## - SUBJECT ADDED ENTRY--CHRONOLOGICAL TERM | |
Chronological term | Forensic Analysts |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Penetration Testers |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
a | 7 |
b | cbc |
c | orignew |
d | 1 |
e | ecip |
f | 20 |
g | y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Koha issues (borrowed), all copies | 3 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Bill No. | Bill Date | Cost, normal purchase price | PO No. | PO Date | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Cost, replacement price | Price effective from | Vendor/Supplier | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Computer Science and Engineering | IIITD | IIITD | Reference | 22/12/2014 | IN9438/14-15 | 2014-12-20 | 2317.43 | IIITD/LIC/BS/2012/02/110 | 2014-11-27 | 11 | 12 | REF 005.133 OCO-V | 004703 | 08/12/2022 | 11/11/2022 | $ 49.95 | 22/12/2014 | Shankar's Book Agency Pvt. Ltd. | Books |