|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn932322888 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151216s2016 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d GGVRL
|d DEBBG
|d DEBSZ
|d OCLCA
|d CEF
|d OCLCQ
|d OCLCO
|d CNCEN
|d ERF
|d UKBTH
|d UHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1105790303
|a 1112540143
|a 1112968665
|a 1113181854
|
020 |
|
|
|a 9780128029824
|
020 |
|
|
|a 012802982X
|
020 |
|
|
|a 0128029641
|
020 |
|
|
|a 9780128029640
|
020 |
|
|
|z 9780128029640
|
024 |
8 |
|
|a C20130142833
|
024 |
8 |
|
|a 9780128029824
|
029 |
1 |
|
|a DEBBG
|b BV043968392
|
029 |
1 |
|
|a DEBSZ
|b 485788918
|
029 |
1 |
|
|a GBVCP
|b 88284797X
|
035 |
|
|
|a (OCoLC)932322888
|z (OCoLC)1105790303
|z (OCoLC)1112540143
|z (OCoLC)1112968665
|z (OCoLC)1113181854
|
037 |
|
|
|a CL0500000688
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.885.G66
|
082 |
0 |
4 |
|a 025.04
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Long, Johnny,
|e author.
|
245 |
1 |
0 |
|a Google hacking for penetration testers /
|c Johnny Long, Bill Gardner, Justin Brown.
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a Waltham, MA :
|b Syngress,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (viii, 225 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed December 14, 2015).
|
500 |
|
|
|a Includes index.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Chapter 1. Google search basics -- chapter 2. Advanced operators -- chapter 3. Google hacking basics -- chapter 4. Document grinding and database digging -- chapter 5. Google's part in an information collection framework -- chapter 6. Locating exploits and finding targets -- chapter 7. Ten simple security searches that work -- chapter 8. Tracking down web servers, login portals, and network hardware -- chapter 9. Usernames, passwords, and secret stuff, oh my! -- chapter 10. Hacking Google services -- chapter 11. Hacking Google showcase -- chapter 12. Protecting yourself from Google hackers.
|
520 |
|
|
|a Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. This book shows how security professionals and system administrators manipulate Google to find sensitive information in order to "self-police" their own organizations.
|
542 |
|
|
|f Copyright: Elsevier Science & Technology
|g 2016
|
542 |
|
|
|f Copyright ©: Elsevier Science & Technology
|g 2016
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Google.
|
630 |
0 |
7 |
|a Google
|2 fast
|
650 |
|
0 |
|a Web search engines.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet programming.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Moteurs de recherche sur Internet.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Programmation Internet.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet programming
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
650 |
|
7 |
|a Web search engines
|2 fast
|
700 |
1 |
|
|a Gardner, Bill,
|e author.
|
700 |
1 |
|
|a Brown, Justin,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128029824/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL6QDC
|
994 |
|
|
|a 92
|b IZTAP
|