|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn797917449 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
121121s2011 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d FEM
|d OCLCO
|d OCLCQ
|d OCLCO
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 968989850
|
020 |
|
|
|a 9781849512114
|
020 |
|
|
|a 1849512116
|
029 |
1 |
|
|a DEBBG
|b BV044166615
|
029 |
1 |
|
|a DEBSZ
|b 397331770
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999938509905765
|
035 |
|
|
|a (OCoLC)797917449
|z (OCoLC)968989850
|
037 |
|
|
|a 2944456579490605079
|b TotalBoox
|f Ebook only
|n www.totalboox.com
|
050 |
|
4 |
|a TK5105.8884
|
082 |
0 |
4 |
|a 006.7
|a 006.752
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Connelly, Olly.
|
245 |
1 |
0 |
|a WordPress 3 Ultimate Security.
|
260 |
|
|
|a Birmingham :
|b Packt Pub.,
|c 2011.
|
300 |
|
|
|a 1 online resource (691 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
505 |
0 |
|
|a WordPress 3 Ultimate Security; WordPress 3 Ultimate Security; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. So What's the Risk?; Calculated risk; An overview of our risk; Meet the hackers; White hat; Black hat; Botnets; Cybercriminals; Hacktivists; Scrapers.
|
505 |
8 |
|
|a Script kiddiesSpammers; Misfits; Grey hat; Hackers and crackers; Physically hacked off; Social engineering; Phone calls; Walk-ins; Enticing URLs; Phishing; Social networking (and so on); Protecting against social engineering; Weighing up Windows, Linux, and Mac OS X; The deny-by-default permission model; The open source advantage; System security summary; Malwares dissected; Blended threats; Crimeware; Data loggers; At loggerheads with the loggers; Hoax virus; Rootkits; Spyware; Trojan horses; Viruses; Worms; Zero day; World wide worry; Old browser (and other app) versions.
|
505 |
8 |
|
|a Unencrypted trafficDodgy sites, social engineering, and phish food; Infected public PCs; Sniffing out problems with wireless; Wireless hotspots; Evil twins; Ground zero; Overall risk to the site and server; Physical server vulnerabilities; Open ports with vulnerable services; Access and authentication issues; Buffer overflow attacks; Intercepting data with man-in-the-middle attacks; Cracking authentication with password attacks; The many dangers of cross-site scripting (XSS); Assorted threats with cross-site request forgery (CSRF); Accessible round-up; Lazy site and server administration.
|
505 |
8 |
|
|a Vulnerable versionsRedundant files; Privilege escalation and jailbreak opportunities; Unchecked information leak; Directory traversal attacks; Content theft, SEO pillaging, and spam defacement; Scraping and media hotlinking; Damn spam, rants, and heart attacks; Summary; 2. Hack or Be Hacked; Introducing the hacker's methodology; Reconnaissance; Scanning; Gain access; Secure access; Cover tracks; Ethical hacking vs. doing time; The reconnaissance phase; What to look for; How to look for it; Google hacking; Sites and links; Finding files; Keyword scanning; Phone numbers; More on Google hacking.
|
505 |
8 |
|
|a Scouting-assistive applicationsHacking Google hacking with SiteDigger; WHOIS whacking; Demystifying DNS; Resolving a web address; Domain name security; The scanning phase; Mapping out the network; Nmap: the Network Mapper; Using ping sweeps to map out a network; Checking for open ports on a network device; Checking for vulnerable services on a network device; Secondary scanners; Scanning for server vulnerabilities; Nessus; Creating policies with Nessus; Assessing problems; OpenVAS; GFI Languard; Qualys; NeXpose and Metasploit; Scanning for web vulnerabilities; Wikto; Paros Proxy; HackerTarget.
|
500 |
|
|
|a Alternative tools.
|
520 |
|
|
|a Protect your WordPress site and its network.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a WordPress (Electronic resource)
|
630 |
0 |
7 |
|a WordPress (Electronic resource)
|2 fast
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Web
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a World Wide Web
|x Security measures
|2 fast
|
758 |
|
|
|i has work:
|a WordPress 3 ultimate security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PD3KgdDhFHbkxDpqyJK6yGw
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Connelly, Olly.
|t WordPress 3 Ultimate Security.
|d Birmingham : Packt Publishing, ©2011
|z 9781849512107
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=948509
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL948509
|
994 |
|
|
|a 92
|b IZTAP
|