Loading…

Hacking : the next generation /

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hac...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Dhanjani, Nitesh
Other Authors: Rios, Billy, Hardin, Brett
Format: Electronic eBook
Language:Inglés
Published: Sebastopol, Calif. : O'Reilly, 2009.
Edition:1st ed.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Table of Contents; Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical Security Engineering; Dumpster Diving; Hanging Out at the Corporate Campus; Google Earth; Social Engineering Call Centers; Search Engine Hacking; Google Hacking; Automating Google Hacking; Extracting Metadata from Online Documents; Searching for Source Code; Leveraging Social Networks.