|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn688617903 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101202s2011 maua ob 001 0 eng d |
010 |
|
|
|a 2010041227
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d E7B
|d EBLCP
|d YDXCP
|d OCLCQ
|d B24X7
|d REDDC
|d OCLCQ
|d MERUC
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCO
|d UMI
|d OCLCA
|d UKDOC
|d DEBBG
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d NNO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCA
|d CEF
|d INT
|d OCLCQ
|d WYU
|d UKAHL
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 712995406
|a 881184301
|a 1065696372
|a 1107339859
|a 1153042395
|a 1192347569
|a 1240516157
|
020 |
|
|
|a 9781597495899
|q (electronic bk.)
|
020 |
|
|
|a 1597495891
|q (electronic bk.)
|
020 |
|
|
|z 9781597495882
|
020 |
|
|
|z 1597495883
|
029 |
1 |
|
|a AU@
|b 000053263241
|
029 |
1 |
|
|a CHNEW
|b 000607760
|
029 |
1 |
|
|a DEBBG
|b BV042032974
|
029 |
1 |
|
|a DEBSZ
|b 372738303
|
029 |
1 |
|
|a DEBSZ
|b 414184521
|
029 |
1 |
|
|a DEBSZ
|b 430922477
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:9910110357205765
|
035 |
|
|
|a (OCoLC)688617903
|z (OCoLC)712995406
|z (OCoLC)881184301
|z (OCoLC)1065696372
|z (OCoLC)1107339859
|z (OCoLC)1153042395
|z (OCoLC)1192347569
|z (OCoLC)1240516157
|
037 |
|
|
|a CL0500000441
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b W548 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wilhelm, Thomas.
|
245 |
1 |
0 |
|a Ninja hacking :
|b unconventional penetration testing tactics and techniques /
|c Thomas Wilhelm, Jason Andress.
|
260 |
|
|
|a Burlington, MA :
|b Syngress/Elsevier,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xii, 310 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Ninja Hacking; Copyright; Table of Contents; About the Authors; About the Ninjutsu Consultant; About the Technical Editor; Introduction; Chapter 1. The Historical Ninja; Chapter 2. The Modern Ninja; Chapter 3. Strategies and Tactics; Chapter 4. Exploitation of Current Events; Chapter 5. Disguise; Chapter 6. Impersonation; Chapter 7. Infiltration; Chapter 8. Use of Timing to Enter an Area; Chapter 9. Discovering Weak Points in Area Defenses; Chapter 10. Psychological Weaknesses; Chapter 11. Distraction; Chapter 12. Concealment Devices; Chapter 13. Covert Listening Devices.
|
520 |
|
|
|a Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hackers
|2 fast
|
700 |
1 |
|
|a Andress, Jason.
|
776 |
0 |
8 |
|i Print version:
|a Wilhelm, Thomas.
|t Ninja hacking.
|d Burlington, MA : Syngress/Elsevier, ©2011
|z 9781597495882
|w (DLC) 2010041227
|w (OCoLC)671491671
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597495899/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a 123Library
|b 123L
|n 37334
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23095086
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00040135
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL629977
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10427969
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 344973
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3535373
|
994 |
|
|
|a 92
|b IZTAP
|