Google hacking for penetration testers: [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress
2008
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Beschreibung: | Includes index. - Previous ed.: 2005. - Auf dem Titelblatt als Volume 2 bezeichnet |
Beschreibung: | XIX, 534 S. Ill. |
ISBN: | 1597491764 9781597491761 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023343334 | ||
003 | DE-604 | ||
005 | 20080707 | ||
007 | t | ||
008 | 080613s2008 a||| |||| 00||| eng d | ||
020 | |a 1597491764 |c (pbk) : £27.99 |9 1-59749-176-4 | ||
020 | |a 9781597491761 |c (pbk) : £27.99 |9 978-1-59749-176-1 | ||
035 | |a (OCoLC)255863748 | ||
035 | |a (DE-599)GBV540440051 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
082 | 0 | |a 025.04 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 616f |2 stub | ||
100 | 1 | |a Long, Johnny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Google hacking for penetration testers |b [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] |c Johnny Long |
250 | |a 2. ed. | ||
264 | 1 | |a Burlington, Mass. |b Syngress |c 2008 | |
300 | |a XIX, 534 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. - Previous ed.: 2005. - Auf dem Titelblatt als Volume 2 bezeichnet | ||
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Google |0 (DE-588)4726597-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 0 | 1 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 1 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 2 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
689 | 3 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 3 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 3 | |8 4\p |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-016527075 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137697323778048 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Long, Johnny |
author_facet | Long, Johnny |
author_role | aut |
author_sort | Long, Johnny |
author_variant | j l jl |
building | Verbundindex |
bvnumber | BV023343334 |
classification_rvk | ST 277 |
classification_tum | DAT 616f |
ctrlnum | (OCoLC)255863748 (DE-599)GBV540440051 |
dewey-full | 025.04 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 025 - Operations of libraries and archives |
dewey-raw | 025.04 |
dewey-search | 025.04 |
dewey-sort | 225.04 |
dewey-tens | 020 - Library and information sciences |
discipline | Allgemeines Informatik |
discipline_str_mv | Allgemeines Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02711nam a2200625 c 4500</leader><controlfield tag="001">BV023343334</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080707 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080613s2008 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491764</subfield><subfield code="c">(pbk) : £27.99</subfield><subfield code="9">1-59749-176-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491761</subfield><subfield code="c">(pbk) : £27.99</subfield><subfield code="9">978-1-59749-176-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255863748</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV540440051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.04</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 616f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Google hacking for penetration testers</subfield><subfield code="b">[a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts]</subfield><subfield code="c">Johnny Long</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 534 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Previous ed.: 2005. - Auf dem Titelblatt als Volume 2 bezeichnet</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016527075</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV023343334 |
illustrated | Illustrated |
index_date | 2024-07-02T21:02:28Z |
indexdate | 2024-07-09T21:16:25Z |
institution | BVB |
isbn | 1597491764 9781597491761 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016527075 |
oclc_num | 255863748 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | XIX, 534 S. Ill. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress |
record_format | marc |
spelling | Long, Johnny Verfasser aut Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] Johnny Long 2. ed. Burlington, Mass. Syngress 2008 XIX, 534 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes index. - Previous ed.: 2005. - Auf dem Titelblatt als Volume 2 bezeichnet Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Google (DE-588)4726597-8 gnd rswk-swf Reverse Engineering (DE-588)4391935-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Google (DE-588)4726597-8 s Reverse Engineering (DE-588)4391935-2 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Penetrationstest (DE-588)4825817-9 s 2\p DE-604 Kryptoanalyse (DE-588)4830502-9 s 3\p DE-604 Hacker (DE-588)4113821-1 s 4\p DE-604 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Long, Johnny Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] Kryptoanalyse (DE-588)4830502-9 gnd Google (DE-588)4726597-8 gnd Reverse Engineering (DE-588)4391935-2 gnd Datensicherung (DE-588)4011144-1 gnd Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4726597-8 (DE-588)4391935-2 (DE-588)4011144-1 (DE-588)4825817-9 (DE-588)4113821-1 (DE-588)4274324-2 |
title | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] |
title_auth | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] |
title_exact_search | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] |
title_exact_search_txtP | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] |
title_full | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] Johnny Long |
title_fullStr | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] Johnny Long |
title_full_unstemmed | Google hacking for penetration testers [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] Johnny Long |
title_short | Google hacking for penetration testers |
title_sort | google hacking for penetration testers a completely new volume of google hacking techniques written by the google guy who maintains the worlds largest database of google hacks find your own sensitive data through google before the bad guys do special google hacking showcase features the best and scariest of google hackers efforts |
title_sub | [a completely new volume of Google hacking techniques ; written by "The Google Guy", who maintains the worldś largest database of Google hacks ; find your own sensitive data through Google before the bad guys do ; special Google hacking showcase features the best and scariest of Google hackers' efforts] |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Google (DE-588)4726597-8 gnd Reverse Engineering (DE-588)4391935-2 gnd Datensicherung (DE-588)4011144-1 gnd Penetrationstest (DE-588)4825817-9 gnd Hacker (DE-588)4113821-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kryptoanalyse Reverse Engineering Datensicherung Penetrationstest Hacker Computersicherheit |
work_keys_str_mv | AT longjohnny googlehackingforpenetrationtestersacompletelynewvolumeofgooglehackingtechniqueswrittenbythegoogleguywhomaintainstheworldslargestdatabaseofgooglehacksfindyourownsensitivedatathroughgooglebeforethebadguysdospecialgooglehackingshowcasefeaturesthebestandscari |