Violent python : (Record no. 10340)

MARC details
000 -LEADER
fixed length control field 01518cam a2200325 i 4500
001 - CONTROL NUMBER
control field 17494901
003 - CONTROL NUMBER IDENTIFIER
control field IIITD
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221112020002.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121015s2013 ne b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012030814
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597499576
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.73.P98
Item number O26 2013
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.133
Edition number 23
Item number OCO-V
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name O'Connor, T. J.
245 10 - TITLE STATEMENT
Title Violent python :
Remainder of title a cookbook for hackers, forensic analysts, penetration testers, and security engineers
Statement of responsibility, etc TJ. O'Connor.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Syngress Media,
Date of publication, distribution, etc ©2013.
Place of publication, distribution, etc Boston:
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 262 p. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "Python is a hacker's language. With its decreased complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive tools already exist, learning Python can help you with the difficult cases where those tools fail"--
600 ## - SUBJECT ADDED ENTRY--PERSONAL NAME
Personal name Python (Computer program language)
610 ## - SUBJECT ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Hackers
630 ## - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Security Engineers
648 ## - SUBJECT ADDED ENTRY--CHRONOLOGICAL TERM
Chronological term Forensic Analysts
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration Testers
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Koha issues (borrowed), all copies 3
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Bill No. Bill Date Cost, normal purchase price PO No. PO Date Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Vendor/Supplier Koha item type
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD Reference 22/12/2014 IN9438/14-15 2014-12-20 2317.43 IIITD/LIC/BS/2012/02/110 2014-11-27 11 12 REF 005.133 OCO-V 004703 08/12/2022 11/11/2022 $ 49.95 22/12/2014 Shankar's Book Agency Pvt. Ltd. Books
© 2024 IIIT-Delhi, library@iiitd.ac.in