Detalles MARC
000 -LEADER |
fixed length control field |
01465nam a2200289Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BO-CjUAPB |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250530172302.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250522t2003||||xx |||||||||||||| ||spa|| |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
8448140508 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9788448140502 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
Bo-CjUAPB |
Language of cataloging |
spa |
Transcribing agency |
Bo-CjUAPB |
Description conventions |
rda |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
spa |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
s-bo--- |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 | |
Item number |
D533 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Dhanjani Nitesh |
Relator term |
Autor |
245 #0 - TITLE STATEMENT |
Title |
Hackers en Linux y Unix |
Remainder of title |
/ |
Statement of responsibility, etc. |
Nitesh Dhanjani |
250 ## - EDITION STATEMENT |
Edition statement |
Primera edición |
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
España |
Name of producer, publisher, distributor, manufacturer |
Editorial Mc Graw Hill |
300 ## - PHYSICAL DESCRIPTION |
Extent |
246 paginas ; |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Hackers en Linux y Unix" es un manual que explora las técnicas y herramientas utilizadas en el hacking ético dentro de los sistemas operativos Linux y Unix. Nitesh Dhanjani ofrece una visión detallada sobre cómo los hackers explotan vulnerabilidades, así como estrategias para proteger sistemas contra ataques. El libro cubre temas como la configuración de redes, la seguridad de aplicaciones, y el uso de scripts para automatizar tareas de hacking. A través de ejemplos prácticos y estudios de caso, el texto proporciona a los lectores habilidades valiosas para entender tanto el lado del hacking como las mejores prácticas en seguridad informática. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Bases de Datos |
Source of heading or term |
ARMARC |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ciencia de la Computación |
Source of heading or term |
ARMARC |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Programación Web |
Source of heading or term |
ARMARC |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Tecnología de la Información |
Source of heading or term |
ARMARC |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
Descargar |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libros |
Source of classification or shelving scheme |
Dewey Decimal Classification |