WorldCat Identities

Long, Johnny

Overview
Works: 22 works in 213 publications in 8 languages and 12,575 library holdings
Genres: Fiction  Short stories  Case studies 
Roles: Author, Editor, Other
Publication Timeline
.
Most widely held works by Johnny Long
Google hacking for penetration testers by Johnny Long( )

78 editions published between 2004 and 2016 in 6 languages and held by 3,569 WorldCat member libraries worldwide

"A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information."--Author
Stealing the network : how to own an identity( )

12 editions published in 2005 in English and held by 1,902 WorldCat member libraries worldwide

"The first two books in this series, Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent, have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. But what happens when the tables turn, and the criminal hackers become the targets of both law enforcement and each other? What happens when they must evade detection by creating new identities and applying their skills to get out fast and vanish into thin air? In Stealing the Network: How to Own an Identity, the hacker crew you've grown to both love and hate find themselves on the run, fleeing from both authority and adversary. They must now use their prowess in a way they never expected - to survive."--Jacket
Stealing the network : how to own a shadow: the chase for Knuth by Johnny Long( )

27 editions published between 2006 and 2011 in English and held by 1,805 WorldCat member libraries worldwide

This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page
Google talking by Brian Baskin( )

18 editions published between 2006 and 2007 in English and Undetermined and held by 1,549 WorldCat member libraries worldwide

"An easy-to-read guide packed with tips and tricks on Google talk. Call home without spending an arm and a leg; Make calls from your computer to any phone in the world; Create your own themes with HTML and cascading style sheets". -- COVER
Penetration tester's open source toolkit. by Johnny Long( )

21 editions published between 2005 and 2012 in English and held by 1,484 WorldCat member libraries worldwide

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools
InfoSec career hacking : sell your skillz, not your soul by Aaron W Bayles( )

7 editions published between 2005 and 2014 in English and held by 1,448 WorldCat member libraries worldwide

"InfoSec Career Hacking" starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world. The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities. It teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies. It provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing by Johnny Long( )

19 editions published between 2007 and 2012 in 3 languages and held by 552 WorldCat member libraries worldwide

"As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks."--Publisher description
Stealing the network : the complete series collector's edition by Ryan Russell( )

15 editions published between 2008 and 2009 in English and held by 226 WorldCat member libraries worldwide

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--The Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black H
Google Hacking for Penetration Testers by Johnny Long( )

1 edition published in 2015 in English and held by 18 WorldCat member libraries worldwide

Google hacking for penetration testers by Johnny Long( )

in English and held by 4 WorldCat member libraries worldwide

The big band sound. over 70 minutes of music( Recording )

2 editions published in 1991 in English and held by 4 WorldCat member libraries worldwide

Aggressive network self-defense by Neil R Wyler( )

1 edition published in 2005 in English and held by 3 WorldCat member libraries worldwide

Annotation
Fei ji shu gong ji : Cai niao ye neng fang hei ke = No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing by Johnny Long( Book )

1 edition published in 2009 in Chinese and held by 2 WorldCat member libraries worldwide

<>( Book )

1 edition published in 2007 in Korean and held by 1 WorldCat member library worldwide

<>( Book )

1 edition published in 2016 in Korean and held by 1 WorldCat member library worldwide

Stealing the network : the complete series collector's edition by Ryan Russell( )

1 edition published in 2009 in English and held by 1 WorldCat member library worldwide

<>( Book )

1 edition published in 2010 in Korean and held by 1 WorldCat member library worldwide

Stealing the network how to own an identity( )

1 edition published in 2005 in English and held by 1 WorldCat member library worldwide

Google hacking for penetration testers [recurso electrónico]. $c by Johnny Long( )

1 edition published in 2008 in English and held by 1 WorldCat member library worldwide

A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information. Johnny Long Learn Google Searching Basics Explore Googles Web-based Interface, build Google queries, and work with Google URLs. Use Advanced Operators to Perform Advanced Queries Combine advanced operators and learn about colliding operators and bad search-fu. Learn the Ways of the Google Hacker See how to use caches for anonymity and review directory listings and traversal techniques. Review Document Grinding and Database Digging See the ways to use Google to locate documents and then search within the documents to locate information. Understand Googles Part in an Information Collection Framework Learn the principles of automating searches and the applications of data mining. Locate Exploits and Finding Targets Locate exploit code and then vulnerable targets. See Ten Simple Security Searches Learn a few searches that give good results just about every time and are good for a security assessment. Track Down Web Servers Locate and profile web servers, login portals, network hardware and utilities. See How Bad Guys Troll for Data Find w ays to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information. Hack Google Services Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing by Johnny Long( )

in English and held by 1 WorldCat member library worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.09 (from 0.00 for Stealing t ... to 0.99 for <> ...)

Stealing the network : how to own an identity
Covers
Stealing the network : how to own an identityStealing the network : how to own a shadow: the chase for KnuthGoogle talkingPenetration tester's open source toolkit.InfoSec career hacking : sell your skillz, not your soulNo tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingStealing the network : the complete series collector's editionAggressive network self-defense
Alternative Names
Johnny Long American computer security expert

롱, 조니

Languages
English (190)

French (4)

Spanish (4)

Chinese (3)

Italian (3)

Korean (3)

German (2)

Czech (1)