Hacking the next generation

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hac...

Full description

Bibliographic Details
Main Author: Dhanjani, Nitesh
Other Authors: Rios, Billy, Hardin, Brett
Format: eBook
Language:English
Published: Sebastopol, Calif. O'Reilly 2009
Edition:1st ed
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02897nmm a2200529 u 4500
001 EB001923227
003 EBX01000000000000001086129
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780596806309 
020 |a 9780596154578 
020 |a 0596154577 
020 |a 0596806302 
020 |a 9781449379216 
050 4 |a QA76.9.A25 
100 1 |a Dhanjani, Nitesh 
245 0 0 |a Hacking  |b the next generation  |c by Nitesh Dhanjani, Billy Rios, Brett Hardin 
250 |a 1st ed 
260 |a Sebastopol, Calif.  |b O'Reilly  |c 2009 
300 |a 1 online resource  |b illustrations 
505 0 |a Table of Contents; Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical Security Engineering; Dumpster Diving; Hanging Out at the Corporate Campus; Google Earth; Social Engineering Call Centers; Search Engine Hacking; Google Hacking; Automating Google Hacking; Extracting Metadata from Online Documents; Searching for Source Code; Leveraging Social Networks 
653 |a Computer networks / Security measures / blmlsh 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer hackers / blmlsh 
653 |a Computer networks / Security measures / fast 
653 |a Sécurité informatique 
653 |a Hackers / fast 
653 |a Computer security 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Pirates informatiques 
653 |a Computer security / blmlsh 
653 |a Hackers / http://id.loc.gov/authorities/subjects/sh94005931 
653 |a Computer security / fast 
653 |a Hackers / bisacsh 
700 1 |a Rios, Billy 
700 1 |a Hardin, Brett 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Includes index 
015 |a 09,N27,0012 
015 |a GBA964722 
776 |z 9780596154578 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780596806309/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8/4 
520 |a With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul