Cargando…

Hacking : the next generation /

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hac...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dhanjani, Nitesh
Otros Autores: Rios, Billy, Hardin, Brett
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, Calif. : O'Reilly, 2009.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn434904834
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 090831s2009 caua o 001 0 eng d
040 |a HF9  |b eng  |e pn  |c HF9  |d HF9  |d CTN  |d CUS  |d UMI  |d OCLCQ  |d CEF  |d OCLCQ  |d DEBSZ  |d EBLCP  |d OCLCQ  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCL  |d N$T  |d TEFOD  |d IDEBK  |d NLE  |d TEFOD  |d OCLCQ  |d FEM  |d OTZ  |d OCLCQ  |d OCLCA  |d OCLCQ  |d WYU  |d UAB  |d UKAHL  |d OCLCQ  |d VT2  |d OCLCQ  |d LVT  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA964722  |2 bnb 
015 |a 09,N27,0012  |2 dnb 
016 7 |a 994782691  |2 DE-101 
016 7 |a 015302225  |2 Uk 
019 |a 776201956  |a 780424992  |a 859884123  |a 968067093  |a 969074982  |a 1064112955  |a 1103273721  |a 1302285818 
020 |a 9780596806309 
020 |a 0596806302 
020 |a 0596154577 
020 |a 9780596154578 
020 |a 9781449379216 
020 |a 1449379214 
020 |z 9780596154578 
029 1 |a AU@  |b 000062353119 
029 1 |a DEBSZ  |b 355423464 
029 1 |a DEBSZ  |b 396379877 
029 1 |a HEBIS  |b 291495044 
035 |a (OCoLC)434904834  |z (OCoLC)776201956  |z (OCoLC)780424992  |z (OCoLC)859884123  |z (OCoLC)968067093  |z (OCoLC)969074982  |z (OCoLC)1064112955  |z (OCoLC)1103273721  |z (OCoLC)1302285818 
037 |a CL0500000050  |b Safari Books Online 
037 |a 3C614632-B9BB-430F-A5BF-91C13C62A96D  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b D436 2009eb 
082 0 4 |a 005.8/4 
084 |a ST 276  |2 rvk 
084 |a ST 277  |2 rvk 
084 |a 004  |2 sdnb 
049 |a UAMI 
100 1 |a Dhanjani, Nitesh. 
245 1 0 |a Hacking :  |b the next generation /  |c by Nitesh Dhanjani, Billy Rios, Brett Hardin. 
250 |a 1st ed. 
260 |a Sebastopol, Calif. :  |b O'Reilly,  |c 2009. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
500 |a Includes index. 
588 0 |a Title viewed on screen (Safari, viewed September 3, 2009). 
588 0 |a Print version record. 
505 0 |a Table of Contents; Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical Security Engineering; Dumpster Diving; Hanging Out at the Corporate Campus; Google Earth; Social Engineering Call Centers; Search Engine Hacking; Google Hacking; Automating Google Hacking; Extracting Metadata from Online Documents; Searching for Source Code; Leveraging Social Networks. 
520 |a With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Hackers. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Pirates informatiques. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 1 7 |a Hackers.  |2 bisacsh 
650 7 |a Computer hackers.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Hackers  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Rios, Billy. 
700 1 |a Hardin, Brett. 
776 0 8 |i Print version:  |a Dhanjani, Nitesh.  |t Hacking.  |d Sebastopol, CA : O'Reilly Media, ©2009  |z 9780596154578  |w (OCoLC)320188944 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780596806309/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26833769 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4442198 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL536678 
938 |a EBSCOhost  |b EBSC  |n 415345 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28409061 
938 |a YBP Library Services  |b YANK  |n 7489238 
938 |a YBP Library Services  |b YANK  |n 7463078 
994 |a 92  |b IZTAP