Image from Google Jackets

Hacking : the next generation / Nitesh Dhanjani, Billy Rios, and Brett Hardin.

By: Contributor(s): Material type: TextTextPublication details: Beijing ; Sebastopol, CA: O'Reilly, c2009.Edition: 1st edDescription: xiii, 279 p. : ill. ; 24 cmISBN:
  • 9780596154578 (pbk.)
  • 0596154577 (pbk.)
Subject(s): DDC classification:
LOC classification:
  • QA76.9 .A25   D515 2009
Contents:
Intelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectives -- Source code samples -- Cache_Snoop.pl.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books MAIN General AUE Library Collection QA76.9 .A25 D515 2009 (Browse shelf(Opens below)) 1 Available 10024081
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9 .A25 C91915 2011 Cyber security essentials / QA76.9 .A25 D378 2010 Hacking exposed malware & root kits : QA76.9 .A25 D378 2010 Hacking exposed malware & root kits : QA76.9 .A25 D515 2009 Hacking : QA76.9.A25 D525 2007 Principles of information systems security : QA76.9.A25 D55 2002 Digital signatures / QA76.9.A25 E5443 2011 The basics of hacking and penetration testing :

Includes index.

"Bringing the attack to your network." -- Cover, p.1.

Intelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectives -- Source code samples -- Cache_Snoop.pl.

There are no comments on this title.

to post a comment.