|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn742346683 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110725s2011 enka of 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d E7B
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d NLGGC
|d YDXCP
|d IDEBK
|d OCLCQ
|d CNNOR
|d OCLCQ
|d U3W
|d OCLCF
|d JBG
|d OCLCQ
|d VTS
|d OCLCQ
|d OCLCO
|d UKMGB
|d STF
|d M8D
|d UKAHL
|d HS0
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB747537
|2 bnb
|
016 |
7 |
|
|a 018011882
|2 Uk
|
019 |
|
|
|a 767809314
|a 816874511
|a 823130601
|
020 |
|
|
|a 9781849512114
|q (electronic bk.)
|
020 |
|
|
|a 1849512116
|q (electronic bk.)
|
020 |
|
|
|a 9781849512107
|
020 |
|
|
|a 1849512108
|
020 |
|
|
|a 1283349248
|
020 |
|
|
|a 9781283349246
|
029 |
1 |
|
|a AU@
|b 000055169052
|
029 |
1 |
|
|a DEBSZ
|b 372699987
|
029 |
1 |
|
|a DEBSZ
|b 472552570
|
029 |
1 |
|
|a UKMGB
|b 018011882
|
035 |
|
|
|a (OCoLC)742346683
|z (OCoLC)767809314
|z (OCoLC)816874511
|z (OCoLC)823130601
|
037 |
|
|
|a 9781849512114
|b Packt Publishing Pvt. Ltd
|
050 |
|
4 |
|a TK5105.8885.W66
|b C66 2011eb
|
072 |
|
7 |
|a COM
|x 087000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060150
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 034000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060130
|2 bisacsh
|
082 |
0 |
4 |
|a 006.78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Connelly, Olly.
|
245 |
1 |
0 |
|a WordPress 3 ultimate security :
|b protect your WordPress site and its network /
|c Olly Connelly.
|
246 |
3 |
|
|a WordPress Three ultimate security
|
260 |
|
|
|a Birmingham :
|b Packt Pub.,
|c 2011.
|
300 |
|
|
|a 1 online resource (1 electronic resource (375 pages)) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This is a comprehensive essential guide to WordPress security written in a light style, which converts learning a really serious topic to an enjoyable read. It is packed with copy-paste solutions to security to suit all levels of security know-how. Just as WordPress is used by a broad spectrum of website owners, with varying degrees of security know-how, so WordPress 3 Ultimate Security is written to be understood by security novices and web professionals alike. From site and server owners and administrators to members of their contributing team, this essential A to Z reference takes a complex and, let's face it, frankly dull subject and makes it accessible, encouraging, and sometimes even fun. Even if you are a total newbie to security, you can transform an insecure site into an iron-clad fortress, safeguarding your site users, your content and, sooner or later, your stress level.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: So What's the Risk?; Calculated risk; An overview of our risk; Meet the hackers; White hat; Black hat; Botnets; Cybercriminals; Hacktivists; Scrapers; Script kiddies; Spammers; Misfits; Grey hat; Hackers and crackers; Physically hacked off; Social engineering; Phone calls; Walk-ins; Enticing URLs; Phishing; Social networking (and so on); Protecting against social engineering; Weighing up Windows, Linux, and Mac OS X; The deny-by-default permission model
|
505 |
8 |
|
|a The open source advantageSystem security summary; Malwares dissected; Blended threats; Crimeware; Data loggers; At loggerheads with the loggers; Hoax virus; Rootkits; Spyware; Trojan horses; Viruses; Worms; Zero day; World wide worry; Old browser (and other app) versions; Unencrypted traffic; Dodgy sites, social engineering, and phish food; Infected public PCs; Sniffing out problems with wireless; Wireless hotspots; Evil twins; Ground zero; Overall risk to the site and server; Physical server vulnerabilities; Open ports with vulnerable services; Access and authentication issues
|
505 |
8 |
|
|a Buffer overflow attacksIntercepting data with man-in-the-middle attacks; Cracking authentication with password attacks; The many dangers of cross-site scripting (XSS); Assorted threats with cross-site request forgery (CSRF); Accessible round-up; Lazy site and server administration; Vulnerable versions; Redundant files; Privilege escalation and jailbreak opportunities; Unchecked information leak; Content theft, SEO pillaging, and spam defacement; Scraping and media hotlinking; Damn spam, rants, and heart attacks; Summary; Chapter 2: Hack or Be Hacked; Introducing the hacker's methodology
|
505 |
8 |
|
|a ReconnaissanceScanning; Gain access; Secure access; Cover tracks; Ethical hacking vs. doing time; The reconnaissance phase; What to look for; How to look for it; Google hacking; More on Google hacking; Scouting-assistive applications; Hacking Google hacking with SiteDigger; WHOIS whacking; Demystifying DNS; Resolving a web address; Domain name security; The scanning phase; Mapping out the network; Nmap: the Network Mapper; Secondary scanners; Scanning for server vulnerabilities; Nessus; OpenVAS; GFI Languard; Qualys; NeXpose and Metasploit; Scanning for web vulnerabilities; Wikto; Paros Proxy
|
505 |
8 |
|
|a HackerTargetAlternative tools; Hack packs; Summary; Chapter 3: Securing the Local Box; Breaking Windows: considering alternatives; Windows security services; Security or Action Center; Windows Firewall; Windows Update; Internet Options; Windows Defender; User Account Control; Configuring UAC in Vista; Configuring UAC in Windows 7; Disabling UAC at the registry (Vista and 7); UAC problems with Vista Home and Premium; Proactive about anti-malware; The reactionary old guard: detection; Regular antivirus scanners; The proactive new guard: prevention; The almost perfect anti-malware solution
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a WordPress (Electronic resource)
|v Handbooks, manuals, etc.
|
630 |
0 |
7 |
|a WordPress (Electronic resource)
|2 fast
|
650 |
|
0 |
|a Blogs
|x Security measures.
|
650 |
|
6 |
|a Blogues
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Digital Media
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x User Generated Content.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Interactive & Multimedia.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x Site Design.
|2 bisacsh
|
655 |
|
7 |
|a manuals (instructional materials)
|2 aat
|
655 |
|
7 |
|a handbooks.
|2 aat
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals.
|2 lcgft
|
655 |
|
7 |
|a Guides et manuels.
|2 rvmgf
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=373128
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26943706
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10481033
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 373128
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 334924
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 6964876
|
994 |
|
|
|a 92
|b IZTAP
|