Google hacking for penetration testers:
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Annotation Annotation |
Beschreibung: | 1 online resource |
ISBN: | 159749013X 9781597490139 1931836361 9781931836364 9780080478050 0080478050 1281055948 9781281055941 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124538 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 159749013X |9 1-59749-013-X | ||
020 | |a 9781597490139 |9 978-1-59749-013-9 | ||
020 | |a 1931836361 |9 1-931836-36-1 | ||
020 | |a 9781931836364 |9 978-1-931836-36-4 | ||
020 | |a 9780080478050 |9 978-0-08-047805-0 | ||
020 | |a 0080478050 |9 0-08-047805-0 | ||
020 | |a 1281055948 |9 1-281-05594-8 | ||
020 | |a 9781281055941 |9 978-1-281-05594-1 | ||
035 | |a (ZDB-33-ESD)ocm57308594 | ||
035 | |a (OCoLC)57308594 | ||
035 | |a (DE-599)BVBBV046124538 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 025.04 |2 22 | |
100 | 1 | |a Long, Johnny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Google hacking for penetration testers |c Johnny Long ; foreword by Ed Skoudis |
264 | 1 | |a Rockland, Mass. |b Syngress |c © 2005 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Annotation | ||
520 | |a Annotation | ||
630 | 0 | 4 | |a Google |
650 | 7 | |a Google |2 blmlsh | |
650 | 7 | |a Google |2 fast | |
650 | 7 | |a COMPUTERS / Online Services |2 bisacsh | |
650 | 7 | |a COMPUTERS / System Administration / Storage & Retrieval |2 bisacsh | |
650 | 7 | |a Web search engines |2 blmlsh | |
650 | 7 | |a Internet searching |2 blmlsh | |
650 | 7 | |a Internet programming |2 blmlsh | |
650 | 7 | |a Internet programming |2 fast | |
650 | 7 | |a Internet searching |2 fast | |
650 | 7 | |a Web search engines |2 fast | |
650 | 4 | |a Web search engines | |
650 | 4 | |a Internet searching | |
650 | 4 | |a Internet programming | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Google |0 (DE-588)4726597-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 0 | 1 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 1 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 2 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
689 | 3 | 0 | |a Google |0 (DE-588)4726597-8 |D s |
689 | 3 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 3 | |8 4\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836364 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504992 | ||
347 | |a data file |2 rda | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781931836364 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442656538624 |
---|---|
any_adam_object | |
author | Long, Johnny |
author_facet | Long, Johnny |
author_role | aut |
author_sort | Long, Johnny |
author_variant | j l jl |
building | Verbundindex |
bvnumber | BV046124538 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm57308594 (OCoLC)57308594 (DE-599)BVBBV046124538 |
dewey-full | 025.04 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 025 - Operations of libraries and archives |
dewey-raw | 025.04 |
dewey-search | 025.04 |
dewey-sort | 225.04 |
dewey-tens | 020 - Library and information sciences |
discipline | Allgemeines |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03440nmm a2200889zc 4500</leader><controlfield tag="001">BV046124538</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749013X</subfield><subfield code="9">1-59749-013-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490139</subfield><subfield code="9">978-1-59749-013-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836361</subfield><subfield code="9">1-931836-36-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836364</subfield><subfield code="9">978-1-931836-36-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478050</subfield><subfield code="9">978-0-08-047805-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478050</subfield><subfield code="9">0-08-047805-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281055948</subfield><subfield code="9">1-281-05594-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281055941</subfield><subfield code="9">978-1-281-05594-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm57308594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)57308594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.04</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Google hacking for penetration testers</subfield><subfield code="c">Johnny Long ; foreword by Ed Skoudis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Annotation</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Google</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Google</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Google</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Online Services</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / System Administration / Storage & Retrieval</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web search engines</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet searching</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet programming</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet programming</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet searching</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web search engines</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web search engines</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet searching</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Google</subfield><subfield code="0">(DE-588)4726597-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836364</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504992</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836364</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124538 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 159749013X 9781597490139 1931836361 9781931836364 9780080478050 0080478050 1281055948 9781281055941 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504992 |
oclc_num | 57308594 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | Long, Johnny Verfasser aut Google hacking for penetration testers Johnny Long ; foreword by Ed Skoudis Rockland, Mass. Syngress © 2005 1 online resource txt rdacontent c rdamedia cr rdacarrier Annotation Google blmlsh Google fast COMPUTERS / Online Services bisacsh COMPUTERS / System Administration / Storage & Retrieval bisacsh Web search engines blmlsh Internet searching blmlsh Internet programming blmlsh Internet programming fast Internet searching fast Web search engines fast Web search engines Internet searching Internet programming Datensicherung (DE-588)4011144-1 gnd rswk-swf Reverse Engineering (DE-588)4391935-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Google (DE-588)4726597-8 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Google (DE-588)4726597-8 s Reverse Engineering (DE-588)4391935-2 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Penetrationstest (DE-588)4825817-9 s 2\p DE-604 Kryptoanalyse (DE-588)4830502-9 s 3\p DE-604 Hacker (DE-588)4113821-1 s 4\p DE-604 http://www.sciencedirect.com/science/book/9781931836364 Verlag URL des Erstveröffentlichers Volltext data file rda 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Long, Johnny Google hacking for penetration testers Google blmlsh Google fast COMPUTERS / Online Services bisacsh COMPUTERS / System Administration / Storage & Retrieval bisacsh Web search engines blmlsh Internet searching blmlsh Internet programming blmlsh Internet programming fast Internet searching fast Web search engines fast Web search engines Internet searching Internet programming Datensicherung (DE-588)4011144-1 gnd Reverse Engineering (DE-588)4391935-2 gnd Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd Google (DE-588)4726597-8 gnd Hacker (DE-588)4113821-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4391935-2 (DE-588)4274324-2 (DE-588)4825817-9 (DE-588)4726597-8 (DE-588)4113821-1 (DE-588)4830502-9 |
title | Google hacking for penetration testers |
title_auth | Google hacking for penetration testers |
title_exact_search | Google hacking for penetration testers |
title_full | Google hacking for penetration testers Johnny Long ; foreword by Ed Skoudis |
title_fullStr | Google hacking for penetration testers Johnny Long ; foreword by Ed Skoudis |
title_full_unstemmed | Google hacking for penetration testers Johnny Long ; foreword by Ed Skoudis |
title_short | Google hacking for penetration testers |
title_sort | google hacking for penetration testers |
topic | Google Google blmlsh Google fast COMPUTERS / Online Services bisacsh COMPUTERS / System Administration / Storage & Retrieval bisacsh Web search engines blmlsh Internet searching blmlsh Internet programming blmlsh Internet programming fast Internet searching fast Web search engines fast Web search engines Internet searching Internet programming Datensicherung (DE-588)4011144-1 gnd Reverse Engineering (DE-588)4391935-2 gnd Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd Google (DE-588)4726597-8 gnd Hacker (DE-588)4113821-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Google COMPUTERS / Online Services COMPUTERS / System Administration / Storage & Retrieval Web search engines Internet searching Internet programming Datensicherung Reverse Engineering Computersicherheit Penetrationstest Hacker Kryptoanalyse |
url | http://www.sciencedirect.com/science/book/9781931836364 |
work_keys_str_mv | AT longjohnny googlehackingforpenetrationtesters |