Hacking : the next generation / Nitesh Dhanjani, Billy Rios, and Brett Hardin.
Material type: TextPublication details: Beijing ; Sebastopol, CA: O'Reilly, c2009.Edition: 1st edDescription: xiii, 279 p. : ill. ; 24 cmISBN:- 9780596154578 (pbk.)
- 0596154577 (pbk.)
- QA76.9 .A25 D515 2009
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | MAIN General | AUE Library Collection | QA76.9 .A25 D515 2009 (Browse shelf(Opens below)) | 1 | Available | 10024081 |
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9 .A25 C91915 2011 Cyber security essentials / | QA76.9 .A25 D378 2010 Hacking exposed malware & root kits : | QA76.9 .A25 D378 2010 Hacking exposed malware & root kits : | QA76.9 .A25 D515 2009 Hacking : | QA76.9.A25 D525 2007 Principles of information systems security : | QA76.9.A25 D55 2002 Digital signatures / | QA76.9.A25 E5443 2011 The basics of hacking and penetration testing : |
Includes index.
"Bringing the attack to your network." -- Cover, p.1.
Intelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectives -- Source code samples -- Cache_Snoop.pl.
There are no comments on this title.