skip to content
Hacking : the next generation Preview this item
ClosePreview this item
Checking...

Hacking : the next generation

Author: Nitesh Dhanjani; Billy Rios; Brett Hardin
Publisher: Sebastopol, Calif. : O'Reilly, 2009.
Edition/Format:   eBook : Document : English : 1st edView all editions and formats
Summary:
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Dhanjani, Nitesh.
Hacking.
Sebastopol, CA : O'Reilly Media, ©2009
(OCoLC)320188944
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Nitesh Dhanjani; Billy Rios; Brett Hardin
ISBN: 9780596806309 0596806302 0596154577 9780596154578 9781449379216 1449379214
OCLC Number: 434904834
Notes: Includes index.
Description: 1 online resource : illustrations
Contents: Table of Contents; Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical Security Engineering; Dumpster Diving; Hanging Out at the Corporate Campus; Google Earth; Social Engineering Call Centers; Search Engine Hacking; Google Hacking; Automating Google Hacking; Extracting Metadata from Online Documents; Searching for Source Code; Leveraging Social Networks.
Responsibility: by Nitesh Dhanjani, Billy Rios, Brett Hardin.

Abstract:

The security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/434904834> # Hacking : the next generation
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "434904834" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/478984397#Place/sebastopol_calif> ; # Sebastopol, Calif.
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/2858-1/{3C614632-B9BB-430F-A5BF-91C13C62A96D}Img100.jpg'" ;
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.84/> ;
    schema:about <http://id.worldcat.org/fast/872150> ; # Hackers
    schema:about <http://experiment.worldcat.org/entity/work/data/478984397#Topic/computer_hackers> ; # Computer hackers
    schema:about <http://experiment.worldcat.org/entity/work/data/478984397#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:bookEdition "1st ed." ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/164730460> ; # Billy Rios
    schema:contributor <http://viaf.org/viaf/101520504> ; # Brett Hardin
    schema:creator <http://viaf.org/viaf/74950339> ; # Nitesh Dhanjani
    schema:datePublished "2009" ;
    schema:description "Table of Contents; Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1. Intelligence Gathering: Peering Through the Windows to Your Organization; Physical Security Engineering; Dumpster Diving; Hanging Out at the Corporate Campus; Google Earth; Social Engineering Call Centers; Search Engine Hacking; Google Hacking; Automating Google Hacking; Extracting Metadata from Online Documents; Searching for Source Code; Leveraging Social Networks."@en ;
    schema:description "With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/478984397> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/320188944> ;
    schema:name "Hacking : the next generation"@en ;
    schema:productID "434904834" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/434904834#PublicationEvent/sebastopol_calif_o_reilly_2009> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/478984397#Agent/o_reilly> ; # O'Reilly
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=4442198> ;
    schema:url <https://www.overdrive.com/search?q=3C614632-B9BB-430F-A5BF-91C13C62A96D> ;
    schema:url <http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781449391898> ;
    schema:url <http://proquest.safaribooksonline.com/9780596806309> ;
    schema:url "http://images.contentreserve.com/ImageType-100/2858-1/{3C614632-B9BB-430F-A5BF-91C13C62A96D}Img100.jpg" ;
    schema:url <http://www.myilibrary.com?id=612205> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=536678> ;
    schema:url <http://deposit.d-nb.de/cgi-bin/dokserv?id=3321497&prov=M&dok_var=1&dok_ext=htm> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=536678> ;
    schema:url <http://excerpts.cdn.overdrive.com/FormatType-410/2858-1/3C6/146/32/HackingTheNextGeneration9781449379216.epub> ;
    schema:url <http://cdn.totalboox.com/static/covers/ORL/3c8d56a56bcb0165-b.jpg> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9780596806309> ;
    schema:url <http://www.totalboox.com/book/id-4363238882469937509> ;
    schema:url <https://samples.overdrive.com/?crid=3C614632-B9BB-430F-A5BF-91C13C62A96D&.epub-sample.overdrive.com> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=415345> ;
    schema:workExample <http://worldcat.org/isbn/9780596806309> ;
    schema:workExample <http://worldcat.org/isbn/9780596154578> ;
    schema:workExample <http://worldcat.org/isbn/9781449379216> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/434904834> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/478984397#Place/sebastopol_calif> # Sebastopol, Calif.
    a schema:Place ;
    schema:name "Sebastopol, Calif." ;
    .

<http://experiment.worldcat.org/entity/work/data/478984397#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872150> # Hackers
    a schema:Intangible ;
    schema:name "Hackers"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/101520504> # Brett Hardin
    a schema:Person ;
    schema:familyName "Hardin" ;
    schema:givenName "Brett" ;
    schema:name "Brett Hardin" ;
    .

<http://viaf.org/viaf/164730460> # Billy Rios
    a schema:Person ;
    schema:familyName "Rios" ;
    schema:givenName "Billy" ;
    schema:name "Billy Rios" ;
    .

<http://viaf.org/viaf/74950339> # Nitesh Dhanjani
    a schema:Person ;
    schema:familyName "Dhanjani" ;
    schema:givenName "Nitesh" ;
    schema:name "Nitesh Dhanjani" ;
    .

<http://worldcat.org/isbn/9780596154578>
    a schema:ProductModel ;
    schema:isbn "0596154577" ;
    schema:isbn "9780596154578" ;
    .

<http://worldcat.org/isbn/9780596806309>
    a schema:ProductModel ;
    schema:isbn "0596806302" ;
    schema:isbn "9780596806309" ;
    .

<http://worldcat.org/isbn/9781449379216>
    a schema:ProductModel ;
    schema:isbn "1449379214" ;
    schema:isbn "9781449379216" ;
    .

<http://www.worldcat.org/oclc/320188944>
    a schema:CreativeWork ;
    rdfs:label "Hacking." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/434904834> ; # Hacking : the next generation
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.