Cargando…

WordPress 3 Ultimate Security.

Protect your WordPress site and its network.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Connelly, Olly
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn797917449
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 121121s2011 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d ZCU  |d MERUC  |d ICG  |d OCLCO  |d OCLCF  |d OCLCQ  |d FEM  |d OCLCO  |d OCLCQ  |d OCLCO  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 968989850 
020 |a 9781849512114 
020 |a 1849512116 
029 1 |a DEBBG  |b BV044166615 
029 1 |a DEBSZ  |b 397331770 
029 1 |a DKDLA  |b 820120-katalog:999938509905765 
035 |a (OCoLC)797917449  |z (OCoLC)968989850 
037 |a 2944456579490605079  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
050 4 |a TK5105.8884 
082 0 4 |a 006.7  |a 006.752 
049 |a UAMI 
100 1 |a Connelly, Olly. 
245 1 0 |a WordPress 3 Ultimate Security. 
260 |a Birmingham :  |b Packt Pub.,  |c 2011. 
300 |a 1 online resource (691 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
505 0 |a WordPress 3 Ultimate Security; WordPress 3 Ultimate Security; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. So What's the Risk?; Calculated risk; An overview of our risk; Meet the hackers; White hat; Black hat; Botnets; Cybercriminals; Hacktivists; Scrapers. 
505 8 |a Script kiddiesSpammers; Misfits; Grey hat; Hackers and crackers; Physically hacked off; Social engineering; Phone calls; Walk-ins; Enticing URLs; Phishing; Social networking (and so on); Protecting against social engineering; Weighing up Windows, Linux, and Mac OS X; The deny-by-default permission model; The open source advantage; System security summary; Malwares dissected; Blended threats; Crimeware; Data loggers; At loggerheads with the loggers; Hoax virus; Rootkits; Spyware; Trojan horses; Viruses; Worms; Zero day; World wide worry; Old browser (and other app) versions. 
505 8 |a Unencrypted trafficDodgy sites, social engineering, and phish food; Infected public PCs; Sniffing out problems with wireless; Wireless hotspots; Evil twins; Ground zero; Overall risk to the site and server; Physical server vulnerabilities; Open ports with vulnerable services; Access and authentication issues; Buffer overflow attacks; Intercepting data with man-in-the-middle attacks; Cracking authentication with password attacks; The many dangers of cross-site scripting (XSS); Assorted threats with cross-site request forgery (CSRF); Accessible round-up; Lazy site and server administration. 
505 8 |a Vulnerable versionsRedundant files; Privilege escalation and jailbreak opportunities; Unchecked information leak; Directory traversal attacks; Content theft, SEO pillaging, and spam defacement; Scraping and media hotlinking; Damn spam, rants, and heart attacks; Summary; 2. Hack or Be Hacked; Introducing the hacker's methodology; Reconnaissance; Scanning; Gain access; Secure access; Cover tracks; Ethical hacking vs. doing time; The reconnaissance phase; What to look for; How to look for it; Google hacking; Sites and links; Finding files; Keyword scanning; Phone numbers; More on Google hacking. 
505 8 |a Scouting-assistive applicationsHacking Google hacking with SiteDigger; WHOIS whacking; Demystifying DNS; Resolving a web address; Domain name security; The scanning phase; Mapping out the network; Nmap: the Network Mapper; Using ping sweeps to map out a network; Checking for open ports on a network device; Checking for vulnerable services on a network device; Secondary scanners; Scanning for server vulnerabilities; Nessus; Creating policies with Nessus; Assessing problems; OpenVAS; GFI Languard; Qualys; NeXpose and Metasploit; Scanning for web vulnerabilities; Wikto; Paros Proxy; HackerTarget. 
500 |a Alternative tools. 
520 |a Protect your WordPress site and its network. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a WordPress (Electronic resource) 
630 0 7 |a WordPress (Electronic resource)  |2 fast 
650 0 |a Computer networks  |x Security measures. 
650 0 |a World Wide Web  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Web  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a World Wide Web  |x Security measures  |2 fast 
758 |i has work:  |a WordPress 3 ultimate security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PD3KgdDhFHbkxDpqyJK6yGw  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Connelly, Olly.  |t WordPress 3 Ultimate Security.  |d Birmingham : Packt Publishing, ©2011  |z 9781849512107 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=948509  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL948509 
994 |a 92  |b IZTAP