|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn434904834 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090831s2009 caua o 001 0 eng d |
040 |
|
|
|a HF9
|b eng
|e pn
|c HF9
|d HF9
|d CTN
|d CUS
|d UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d DEBSZ
|d EBLCP
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d OCLCQ
|d OCL
|d N$T
|d TEFOD
|d IDEBK
|d NLE
|d TEFOD
|d OCLCQ
|d FEM
|d OTZ
|d OCLCQ
|d OCLCA
|d OCLCQ
|d WYU
|d UAB
|d UKAHL
|d OCLCQ
|d VT2
|d OCLCQ
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA964722
|2 bnb
|
015 |
|
|
|a 09,N27,0012
|2 dnb
|
016 |
7 |
|
|a 994782691
|2 DE-101
|
016 |
7 |
|
|a 015302225
|2 Uk
|
019 |
|
|
|a 776201956
|a 780424992
|a 859884123
|a 968067093
|a 969074982
|a 1064112955
|a 1103273721
|a 1302285818
|
020 |
|
|
|a 9780596806309
|
020 |
|
|
|a 0596806302
|
020 |
|
|
|a 0596154577
|
020 |
|
|
|a 9780596154578
|
020 |
|
|
|a 9781449379216
|
020 |
|
|
|a 1449379214
|
020 |
|
|
|z 9780596154578
|
029 |
1 |
|
|a AU@
|b 000062353119
|
029 |
1 |
|
|a DEBSZ
|b 355423464
|
029 |
1 |
|
|a DEBSZ
|b 396379877
|
029 |
1 |
|
|a HEBIS
|b 291495044
|
035 |
|
|
|a (OCoLC)434904834
|z (OCoLC)776201956
|z (OCoLC)780424992
|z (OCoLC)859884123
|z (OCoLC)968067093
|z (OCoLC)969074982
|z (OCoLC)1064112955
|z (OCoLC)1103273721
|z (OCoLC)1302285818
|
037 |
|
|
|a CL0500000050
|b Safari Books Online
|
037 |
|
|
|a 3C614632-B9BB-430F-A5BF-91C13C62A96D
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b D436 2009eb
|
082 |
0 |
4 |
|a 005.8/4
|
084 |
|
|
|a ST 276
|2 rvk
|
084 |
|
|
|a ST 277
|2 rvk
|
084 |
|
|
|a 004
|2 sdnb
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dhanjani, Nitesh.
|
245 |
1 |
0 |
|a Hacking :
|b the next generation /
|c by Nitesh Dhanjani, Billy Rios, Brett Hardin.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly,
|c 2009.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Title viewed on screen (Safari, viewed September 3, 2009).
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Table of Contents; Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical Security Engineering; Dumpster Diving; Hanging Out at the Corporate Campus; Google Earth; Social Engineering Call Centers; Search Engine Hacking; Google Hacking; Automating Google Hacking; Extracting Metadata from Online Documents; Searching for Source Code; Leveraging Social Networks.
|
520 |
|
|
|a With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
1 |
7 |
|a Hackers.
|2 bisacsh
|
650 |
|
7 |
|a Computer hackers.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Hackers
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Rios, Billy.
|
700 |
1 |
|
|a Hardin, Brett.
|
776 |
0 |
8 |
|i Print version:
|a Dhanjani, Nitesh.
|t Hacking.
|d Sebastopol, CA : O'Reilly Media, ©2009
|z 9780596154578
|w (OCoLC)320188944
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596806309/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26833769
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4442198
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL536678
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415345
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28409061
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7489238
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7463078
|
994 |
|
|
|a 92
|b IZTAP
|