MARC details
| 000 -LEADER |
| fixed length control field |
10925cam a2200745Mi 4500 |
| 001 - CONTROL NUMBER |
| control field |
on1022785890 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20240829150108.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr |n|---||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
180210s2018 enk o 000 0 eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EBLCP |
| Language of cataloging |
eng |
| Description conventions |
pn |
| Transcribing agency |
EBLCP |
| Modifying agency |
NLE |
| -- |
MERUC |
| -- |
OCLCQ |
| -- |
IDB |
| -- |
OCLCO |
| -- |
OCLCF |
| -- |
VT2 |
| -- |
TEFOD |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
LVT |
| -- |
C6I |
| -- |
UKAHL |
| -- |
OCLCQ |
| -- |
N$T |
| -- |
K6U |
| -- |
OCLCO |
| -- |
UKMGB |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
PSYSI |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
OCLCL |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBC1L5074 |
| Source |
bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
018754838 |
| Source |
Uk |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781788622257 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1788622251 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1788627911 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781788627917 |
| 024 3# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
9781788627917 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
1703785 |
| -- |
(N$T) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1022785890 |
| 037 ## - SOURCE OF ACQUISITION |
| Stock number |
B09237 |
| Source of stock number/acquisition |
01201872 |
| 037 ## - SOURCE OF ACQUISITION |
| Stock number |
0D343309-D4CC-466C-B8FF-7B65F0F49ACD |
| Source of stock number/acquisition |
OverDrive, Inc. |
| Note |
http://www.overdrive.com |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.585 |
| Item number |
.L466 2018eb |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
004.6782 |
| Edition number |
23 |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
MAIN |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Leon, John Daniel. |
| 9 (RLIN) |
999506 |
| 245 10 - TITLE STATEMENT |
| Title |
Security with Go : |
| Remainder of title |
Explore the power of Golang to secure host, web, and cloud services. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc. |
Birmingham : |
| Name of publisher, distributor, etc. |
Packt Publishing, |
| Date of publication, distribution, etc. |
2018. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (334 pages) |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 588 0# - SOURCE OF DESCRIPTION NOTE |
| Source of description note |
Print version record. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic ... |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Security with Go -- About Go -- Go language design -- The History of Go -- Adoption and community -- Common criticisms about Go -- The Go toolchain -- Go mascot -- Learning Go -- Why use Go? -- Why use Go for security? -- Why not use Python? -- Why not use Java? -- Why not use C++? -- Development environment -- Installing Go on other platforms -- Other Linux distributions -- Windows -- Mac -- Setting up Go -- Creating your workspace -- Setting up environment variables -- Editors -- Creating your first package -- Writing your first program -- Running the executable file -- Building the executable file -- Installing the executable file -- Formatting with go fmt -- Running Go examples -- Building a single Go file -- Running a single Go file -- Building multiple Go files -- Building a folder (package) -- Installing a program for use -- Summary -- Chapter 2: The Go Programming Language -- Go language specification -- The Go playground -- A tour of Go -- Keywords -- Notes about source code -- Comments -- Types -- Boolean -- Numeric -- Generic numbers -- Specific numbers -- Unsigned integers -- Signed integers -- Floating point numbers -- Other numeric types -- String -- Array -- Slice -- Struct -- Pointer -- Function -- Interface -- Map -- Channel -- Control structures -- if -- for -- range -- switch, case, fallthrough, and default -- goto -- Defer -- Packages -- Classes -- Inheritance -- Polymorphism -- Constructors -- Methods -- Operator overloading -- Goroutines -- Getting help and documentation -- Online Go documentation -- Offline Go documentation -- Summary -- Chapter 3: Working with Files -- File basics -- Creating an empty file -- Truncating a file -- Getting the file info -- Renaming a file -- Deleting a file. |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Opening and closing files -- Checking whether a file exists -- Checking read and write permissions -- Changing permissions, ownership, and timestamps -- Hard links and symlinks -- Reading and writing -- Copying a file -- Seeking positions in a file -- Writing bytes to a file -- Quickly writing to a file -- Buffered writer -- Reading up to n bytes from a file -- Reading exactly n bytes -- Reading at least n bytes -- Reading all bytes of a file -- Quickly reading whole files to memory -- Buffered reader -- Reading with a scanner -- Archives -- Archive (ZIP) files -- Extracting (unzip) archived files -- Compression -- Compressing a file -- Uncompressing a File -- Creating temporary files and directories -- Downloading a file over HTTP -- Summary -- Chapter 4: Forensics -- Files -- Getting file information -- Finding the largest files -- Finding recently modified files -- Reading the boot sector -- Steganography -- Generating an image with random noise -- Creating a ZIP archive -- Creating a steganographic image archive -- Detecting a ZIP archive in a JPEG image -- Network -- Looking up a hostname from an IP address -- Looking up IP addresses from a hostname -- Looking up MX records -- Looking up nameservers for a hostname -- Summary -- Chapter 5: Packet Capturing and Injection -- Prerequisites -- Installing libpcap and Git -- Installing libpcap on Ubuntu -- Installing libpcap on Windows -- Installing libpcap on macOS -- Installing gopacket -- Permission problems -- Getting a list of network devices -- Capturing packets -- Capturing with filters -- Saving to the pcap file -- Reading from a pcap file -- Decoding packet layers -- Creating a custom layer -- Converting bytes to and from packets -- Creating and sending packets -- Decoding packets faster -- Summary -- Chapter 6: Cryptography -- Hashing -- Hashing small files -- Hashing large files. |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Storing passwords securely -- Encryption -- Cryptographically secure pseudo-random number generator (CSPRNG) -- Symmetric encryption -- AES -- Asymmetric encryption -- Generating a public and private key pair -- Digitally signing a message -- Verifying a signature -- TLS -- Generating a self-signed certificate -- Creating a certificate signing request -- Signing a certificate request -- TLS server -- TLS client -- Other encryption packages -- OpenPGP -- Off The Record (OTR) messaging -- Summary -- Chapter 7: Secure Shell (SSH) -- Using the Go SSH client -- Authentication methods -- Authenticating with a password -- Authenticating with private key -- Verifying remote host -- Executing a command over SSH -- Starting an interactive shell -- Summary -- Chapter 8: Brute Force -- Brute forcing HTTP basic authentication -- Brute forcing the HTML login form -- Brute forcing SSH -- Brute forcing database login -- Summary -- Chapter 9: Web Applications -- HTTP server -- Simple HTTP servers -- HTTP basic auth -- Using HTTPS -- Creating secure cookies -- HTML escaping output -- Middleware with Negroni -- Logging requests -- Adding secure HTTP headers -- Serving static files -- Other best practices -- CSRF tokens -- Preventing user enumeration and abuse -- Registration -- Login -- Resetting the password -- User profiles -- Preventing LFI and RFI abuse -- Contaminated files -- HTTP client -- The basic HTTP request -- Using the client SSL certificate -- Using a proxy -- Using system proxy -- Using a specific HTTP proxy -- Using a SOCKS5 proxy (Tor) -- Summary -- Chapter 10: Web Scraping -- Web scraping fundamentals -- Finding strings in HTTP responses with the strings package -- Using regular expressions to find email addresses in a page -- Extracting HTTP headers from an HTTP response -- Setting cookies with an HTTP client -- Finding HTML comments in a web page. |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Finding unlisted files on a web server -- Changing the user agent of a request -- Fingerprinting web application technology stacks -- Fingerprinting based on HTTP response headers -- Fingerprinting web applications -- How to prevent fingerprinting of your applications -- Using the goquery package for web scraping -- Listing all hyperlinks in a page -- Finding documents in a web page -- Listing page title and headings -- Crawling pages on the site that store the most common words -- Printing a list of external JavaScript files in a page -- Depth-first crawling -- Breadth-first crawling -- How to protect against web scraping -- Summary -- Chapter 11: Host Discovery and Enumeration -- TCP and UDP sockets -- Creating a server -- Creating a client -- Port scanning -- Grabbing a banner from a service -- Creating a TCP proxy -- Finding named hosts on a network -- Fuzzing a network service -- Summary -- Chapter 12: Social Engineering -- Gathering intel via JSON REST API -- Sending phishing emails with SMTP -- Generating QR codes -- Base64 encoding data -- Honeypots -- TCP honeypot -- The TCP testing tool -- HTTP POST form login honeypot -- HTTP form field honeypots -- Sandboxing -- Summary -- Chapter 13: Post Exploitation -- Cross compiling -- Creating bind shells -- Creating reverse bind shells -- Creating web shells -- Finding writable files -- Changing file timestamp -- Changing file permissions -- Changing file ownership -- Summary -- Chapter 14: Conclusions -- Recapping the topics you have learned -- More thoughts on the usage of Go -- What I hope you take away from the book -- Be aware of legal, ethical, and technical boundaries -- Where to go from here -- Getting help and learning more -- Another Book You May Enjoy -- Leave a review -- let other readers know what you think -- Index. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references. |
| 590 ## - LOCAL NOTE (RLIN) |
| Local note |
Added to collection customer.56279.3 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cloud computing |
| General subdivision |
Security measures. |
| 9 (RLIN) |
3783 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Mobile computing |
| General subdivision |
Security measures. |
| 9 (RLIN) |
23592 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Mobile communication systems |
| General subdivision |
Security measures. |
| 9 (RLIN) |
29379 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Go (Computer program language) |
| 9 (RLIN) |
753552 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Infonuagique |
| General subdivision |
Sécurité |
| -- |
Mesures. |
| 9 (RLIN) |
999507 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Informatique mobile |
| General subdivision |
Sécurité |
| -- |
Mesures. |
| 9 (RLIN) |
999337 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Radiocommunications mobiles |
| General subdivision |
Sécurité |
| -- |
Mesures. |
| 9 (RLIN) |
999508 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Go (Langage de programmation) |
| 9 (RLIN) |
999371 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Coding theory & cryptology. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
53461 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
2191 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Data encryption. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
27957 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Network security. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
723080 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Security |
| -- |
General. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Security |
| -- |
Cryptography. |
| Source of heading or term |
bisacsh |
| 9 (RLIN) |
19340 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Networking |
| -- |
Security. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Go (Computer program language) |
| Source of heading or term |
fast |
| 9 (RLIN) |
753552 |
| 758 ## - |
| -- |
has work: |
| -- |
Security with Go (Text) |
| -- |
https://id.oclc.org/worldcat/entity/E39PD3trRFj4KhggRJFCBjQxwC |
| -- |
https://id.oclc.org/worldcat/ontology/hasWork |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Print version: |
| Main entry heading |
Leon, John Daniel. |
| Title |
Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
| Place, publisher, and date of publication |
Birmingham : Packt Publishing, ©2018 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
EBSCOhost |
| Uniform Resource Identifier |
<a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1703785">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1703785</a> |
| 938 ## - |
| -- |
Askews and Holts Library Services |
| -- |
ASKH |
| -- |
BDZ0036190731 |
| 938 ## - |
| -- |
EBL - Ebook Library |
| -- |
EBLB |
| -- |
EBL5259459 |
| 938 ## - |
| -- |
EBSCOhost |
| -- |
EBSC |
| -- |
1703785 |
| 994 ## - |
| -- |
92 |
| -- |
N$T |