Normal view
MARC view
Entry Topical Term
001 - CONTROL NUMBER
- control field: 134
003 - CONTROL NUMBER IDENTIFIER
- control field: DLC
005 - DATE AND TIME OF LATEST TRANSACTION
- control field: 20221023122509.0
008 - FIXED-LENGTH DATA ELEMENTS
- fixed length control field: 110620|| anannbabn |a ana
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
- LC control number: sh2011003137
040 ## - CATALOGING SOURCE
- Original cataloging agency: DLC
- Language of cataloging: eng
- Transcribing agency: DLC
150 #0 - HEADING--TOPICAL TERM
- Topical term or geographic name entry element: Penetration testing (Computer security)
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Ethical hacking (Computer security)
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Computer security
670 ## - SOURCE DATA FOUND
- Source citation: Work cat.: 2011025807: Penetration tester's open source toolkit, 2011.
670 ## - SOURCE DATA FOUND
- Source citation: McGraw-Hill Dict. of Sci. and Tech. Terms, 2003
- Information found: (Penetration testing: an activity that is intended to determine if there is a way to cause a computer program to fail to perform in the expected manner; it involves hypothsizing flaws that would prevent the program from enforcing security, and conducting experiments to confirm or refute hypothesized flaws)
670 ## - SOURCE DATA FOUND
- Source citation: Wikipedia, viewed June 20, 2011
- Information found: (Penetration test; occasionally: Pentest; evaluating the security of a computer system or network by simulating an attack from a malicious source)
670 ## - SOURCE DATA FOUND
- Source citation: CEH prep guide : the comprehensive guide to certified ethical hacking, 2008.