Cargando…

Ninja hacking : unconventional penetration testing tactics and techniques /

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wilhelm, Thomas
Otros Autores: Andress, Jason
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress/Elsevier, ©2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn688617903
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 101202s2011 maua ob 001 0 eng d
010 |a  2010041227 
040 |a N$T  |b eng  |e pn  |c N$T  |d E7B  |d EBLCP  |d YDXCP  |d OCLCQ  |d B24X7  |d REDDC  |d OCLCQ  |d MERUC  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d UMI  |d OCLCA  |d UKDOC  |d DEBBG  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d NNO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCA  |d CEF  |d INT  |d OCLCQ  |d WYU  |d UKAHL  |d VT2  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 712995406  |a 881184301  |a 1065696372  |a 1107339859  |a 1153042395  |a 1192347569  |a 1240516157 
020 |a 9781597495899  |q (electronic bk.) 
020 |a 1597495891  |q (electronic bk.) 
020 |z 9781597495882 
020 |z 1597495883 
029 1 |a AU@  |b 000053263241 
029 1 |a CHNEW  |b 000607760 
029 1 |a DEBBG  |b BV042032974 
029 1 |a DEBSZ  |b 372738303 
029 1 |a DEBSZ  |b 414184521 
029 1 |a DEBSZ  |b 430922477 
029 1 |a DKDLA  |b 820120-katalog:9910110357205765 
035 |a (OCoLC)688617903  |z (OCoLC)712995406  |z (OCoLC)881184301  |z (OCoLC)1065696372  |z (OCoLC)1107339859  |z (OCoLC)1153042395  |z (OCoLC)1192347569  |z (OCoLC)1240516157 
037 |a CL0500000441  |b Safari Books Online 
050 4 |a QA76.9.A25  |b W548 2011eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Wilhelm, Thomas. 
245 1 0 |a Ninja hacking :  |b unconventional penetration testing tactics and techniques /  |c Thomas Wilhelm, Jason Andress. 
260 |a Burlington, MA :  |b Syngress/Elsevier,  |c ©2011. 
300 |a 1 online resource (xii, 310 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Front Cover; Ninja Hacking; Copyright; Table of Contents; About the Authors; About the Ninjutsu Consultant; About the Technical Editor; Introduction; Chapter 1. The Historical Ninja; Chapter 2. The Modern Ninja; Chapter 3. Strategies and Tactics; Chapter 4. Exploitation of Current Events; Chapter 5. Disguise; Chapter 6. Impersonation; Chapter 7. Infiltration; Chapter 8. Use of Timing to Enter an Area; Chapter 9. Discovering Weak Points in Area Defenses; Chapter 10. Psychological Weaknesses; Chapter 11. Distraction; Chapter 12. Concealment Devices; Chapter 13. Covert Listening Devices. 
520 |a Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Hackers. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hackers  |2 fast 
700 1 |a Andress, Jason. 
776 0 8 |i Print version:  |a Wilhelm, Thomas.  |t Ninja hacking.  |d Burlington, MA : Syngress/Elsevier, ©2011  |z 9781597495882  |w (DLC) 2010041227  |w (OCoLC)671491671 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495899/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a 123Library  |b 123L  |n 37334 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23095086 
938 |a Books 24x7  |b B247  |n bks00040135 
938 |a EBL - Ebook Library  |b EBLB  |n EBL629977 
938 |a ebrary  |b EBRY  |n ebr10427969 
938 |a EBSCOhost  |b EBSC  |n 344973 
938 |a YBP Library Services  |b YANK  |n 3535373 
994 |a 92  |b IZTAP