<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Hacking for dummies</title>
  </titleInfo>
  <name type="personal">
    <namePart>Beaver, Kevin.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="corporate">
    <namePart>ebrary, Inc</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="local">Electronic books.</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">inu</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Indianapolis, Ind</placeTerm>
    </place>
    <publisher>John Wiley &amp; Sons, Inc.</publisher>
    <dateIssued>2013</dateIssued>
    <edition>4th ed.</edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">electronic</form>
    <form authority="gmd">electronic resource</form>
    <extent>xvi, 390 p. : ill.</extent>
  </physicalDescription>
  <tableOfContents>pt. I. Building the foundation for ethical hacking -- pt. II. Putting ethical hacking in motion -- pt. III. Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. VI. Ethical hacking aftermath -- pt. VII. The part of tens.</tableOfContents>
  <note type="statement of responsibility">by Kevin Beaver.</note>
  <note>Includes index.</note>
  <note>Electronic reproduction. Palo Alto, Calif. : ebrary, 2013. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.</note>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer networks</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer hackers</topic>
  </subject>
  <classification authority="lcc">QA76.9.A25 B43 2013eb</classification>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="lccn" invalid="yes"/>
  <identifier type="uri">http://site.ebrary.com/lib/rucke/Doc?id=10643067</identifier>
  <location>
    <url>http://site.ebrary.com/lib/rucke/Doc?id=10643067</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg">CaPaEBR</recordContentSource>
    <recordCreationDate encoding="marc">121212</recordCreationDate>
    <recordIdentifier source="CaPaEBR">ebr10643067</recordIdentifier>
  </recordInfo>
</mods>
