COMPUTER PROGRAMMING FOR BEGINNERS: (Record no. 1202)

MARC details
000 -LEADER
fixed length control field 01989nam a22002537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230705024845.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230705b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9798651465019
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 8651465017
040 ## - CATALOGING SOURCE
Transcribing agency 0
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.133 MAC
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Edition number 0
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Mach, Dylan
245 ## - TITLE STATEMENT
Title COMPUTER PROGRAMMING FOR BEGINNERS:
Remainder of title 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing
Statement of responsibility, etc. Dylan Mach
300 ## - PHYSICAL DESCRIPTION
Extent 640 pages
Dimensions 30 cm
520 ## - SUMMARY, ETC.
Summary, etc. If you want to know more about Linux and Python Programming and get a good knowledge of Networking and Hacking, to protect your system, then keep reading. This book includes: LINUX COMMAND LINE For Beginners With this easy-to-use guide, you will learn the Linux Operating System from the beginning, how to install it, different distributions, how to write the script, and some basic and advanced shell commands. PYTHON Programming for Beginners With this step-by-step guide, you will get a basic knowledge of Python Computer Programming; you will find tons of examples of codes, to make easier your learning process. NETWORKING for Beginners The book covers an overview of different types of cyber-attacks, the steps to follow to prevent attackers from targeting your system and infect your files. HACKING with KALI LINUX This book describes the best ways to find vulnerabilities of a system in terms of hacking and protecting your network. Regardless of your computer skills, this book, with its easy-to-use guidelines, will give you complete knowledge of hacking and networking within Linux and Python programming.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Networking
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer programming
General subdivision C++ (Computer program language)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer programs
General subdivision HTML (Document markup language)
-- Java (Computer program language)
843 ## - REPRODUCTION NOTE
Type of reproduction Photocopy
887 ## - NON-MARC INFORMATION FIELD
Source of data CamTech Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     CamTech Library CamTech Library STEM & Engineering 07/05/2023   0000001530 07/05/2023 C.1 07/05/2023 Books
    Dewey Decimal Classification     CamTech Library CamTech Library STEM & Engineering 07/06/2023   0000001533 07/06/2023 C.2 07/06/2023 Books
    Dewey Decimal Classification     CamTech Library CamTech Library STEM & Engineering 07/06/2023   0000001564 07/06/2023 C.3 07/06/2023 Books