Defense against the black arts: how hackers do what they do and how to protect against it
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hac...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon |
Beschreibung: | Includes index |
Beschreibung: | 1 Online-Ressource (xvi, 396 Seiten) illustrations |
ISBN: | 1439821224 1466509201 9781439821220 9781466509207 |
Zugangseinschränkungen: | Open Access |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048282141 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220610s2012 |||| o||u| ||||||eng d | ||
020 | |a 1439821224 |q (electronic bk.) |9 1439821224 | ||
020 | |a 1466509201 |9 1466509201 | ||
020 | |a 9781439821220 |q (electronic bk.) |9 9781439821220 | ||
020 | |a 9781466509207 |9 9781466509207 | ||
020 | |z 1439821194 |q (alk. paper) |9 1439821194 | ||
020 | |z 9781439821190 |q (alk. paper) |9 9781439821190 | ||
035 | |a (OCoLC)761369094 | ||
035 | |a (DE-599)BVBBV048282141 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
100 | 1 | |a Varsalone, Jesse |e Verfasser |4 aut | |
245 | 1 | 0 | |a Defense against the black arts |b how hackers do what they do and how to protect against it |c Jesse Varsalone, Matthew McFadden ; with Sean Morrissey [and others] ; foreword by Joe McCray |
264 | 0 | |a Boca Raton, FL |b CRC Press |c ©2012 | |
300 | |a 1 Online-Ressource (xvi, 396 Seiten) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
505 | 8 | |a Hacking the Windows OS -- Obtaining Windows passwords -- Imaging and extraction -- Bypassing web filters -- Muking with the Web -- Finding it all on the net -- Research time -- Capturing network traffic -- Finding the vulnerabilities -- Metasploit -- Other attack tools -- Social engineering with Web 2.0 -- Hack the Macs -- Wireless hacking | |
506 | 0 | |a Open Access |5 EbpS | |
520 | 3 | |a As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon | |
650 | 4 | |a Computer Security | |
650 | 4 | |a Pirates informatiques | |
650 | 7 | |a Réseaux d'ordinateurs |2 Sécurité | |
650 | 4 | |a Sécurité informatique | |
650 | 7 | |a Computer networks |2 Security measures | |
650 | 4 | |a Computer security | |
650 | 7 | |a COMPUTERS |2 Internet | |
650 | 7 | |a COMPUTERS |2 Networking | |
650 | 7 | |a COMPUTERS |2 Security | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
653 | 6 | |a Electronic books | |
653 | 6 | |a Electronic books | |
700 | 1 | |a McFadden, Matthew |e Sonstige |4 oth | |
700 | 1 | |a Morrissey, Sean |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Varsalone, Jesse |t Defense against the black arts |d Boca Raton, FL : CRC Press, ©2012 |z 9781439821190 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=405406 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-4-EOAC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033662307 |
Datensatz im Suchindex
_version_ | 1804184108042027008 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Varsalone, Jesse |
author_facet | Varsalone, Jesse |
author_role | aut |
author_sort | Varsalone, Jesse |
author_variant | j v jv |
building | Verbundindex |
bvnumber | BV048282141 |
collection | ZDB-4-EOAC |
contents | Hacking the Windows OS -- Obtaining Windows passwords -- Imaging and extraction -- Bypassing web filters -- Muking with the Web -- Finding it all on the net -- Research time -- Capturing network traffic -- Finding the vulnerabilities -- Metasploit -- Other attack tools -- Social engineering with Web 2.0 -- Hack the Macs -- Wireless hacking |
ctrlnum | (OCoLC)761369094 (DE-599)BVBBV048282141 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03125nmm a2200601 c 4500</leader><controlfield tag="001">BV048282141</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220610s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439821224</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">1439821224</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466509201</subfield><subfield code="9">1466509201</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439821220</subfield><subfield code="q">(electronic bk.)</subfield><subfield code="9">9781439821220</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466509207</subfield><subfield code="9">9781466509207</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1439821194</subfield><subfield code="q">(alk. paper)</subfield><subfield code="9">1439821194</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439821190</subfield><subfield code="q">(alk. paper)</subfield><subfield code="9">9781439821190</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)761369094</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048282141</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Varsalone, Jesse</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defense against the black arts</subfield><subfield code="b">how hackers do what they do and how to protect against it</subfield><subfield code="c">Jesse Varsalone, Matthew McFadden ; with Sean Morrissey [and others] ; foreword by Joe McCray</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">©2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 396 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Hacking the Windows OS -- Obtaining Windows passwords -- Imaging and extraction -- Bypassing web filters -- Muking with the Web -- Finding it all on the net -- Research time -- Capturing network traffic -- Finding the vulnerabilities -- Metasploit -- Other attack tools -- Social engineering with Web 2.0 -- Hack the Macs -- Wireless hacking</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">Open Access</subfield><subfield code="5">EbpS</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="2">Sécurité</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="2">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="2">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McFadden, Matthew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morrissey, Sean</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Varsalone, Jesse</subfield><subfield code="t">Defense against the black arts</subfield><subfield code="d">Boca Raton, FL : CRC Press, ©2012</subfield><subfield code="z">9781439821190</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=405406</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EOAC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033662307</subfield></datafield></record></collection> |
id | DE-604.BV048282141 |
illustrated | Illustrated |
index_date | 2024-07-03T20:00:57Z |
indexdate | 2024-07-10T09:34:05Z |
institution | BVB |
isbn | 1439821224 1466509201 9781439821220 9781466509207 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033662307 |
oclc_num | 761369094 |
open_access_boolean | 1 |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (xvi, 396 Seiten) illustrations |
psigel | ZDB-4-EOAC |
publishDateSearch | 2012 |
publishDateSort | 2012 |
record_format | marc |
spelling | Varsalone, Jesse Verfasser aut Defense against the black arts how hackers do what they do and how to protect against it Jesse Varsalone, Matthew McFadden ; with Sean Morrissey [and others] ; foreword by Joe McCray Boca Raton, FL CRC Press ©2012 1 Online-Ressource (xvi, 396 Seiten) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Hacking the Windows OS -- Obtaining Windows passwords -- Imaging and extraction -- Bypassing web filters -- Muking with the Web -- Finding it all on the net -- Research time -- Capturing network traffic -- Finding the vulnerabilities -- Metasploit -- Other attack tools -- Social engineering with Web 2.0 -- Hack the Macs -- Wireless hacking Open Access EbpS As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon Computer Security Pirates informatiques Réseaux d'ordinateurs Sécurité Sécurité informatique Computer networks Security measures Computer security COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Hackers Electronic books McFadden, Matthew Sonstige oth Morrissey, Sean Sonstige oth Erscheint auch als Druck-Ausgabe Varsalone, Jesse Defense against the black arts Boca Raton, FL : CRC Press, ©2012 9781439821190 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=405406 Verlag kostenfrei Volltext |
spellingShingle | Varsalone, Jesse Defense against the black arts how hackers do what they do and how to protect against it Hacking the Windows OS -- Obtaining Windows passwords -- Imaging and extraction -- Bypassing web filters -- Muking with the Web -- Finding it all on the net -- Research time -- Capturing network traffic -- Finding the vulnerabilities -- Metasploit -- Other attack tools -- Social engineering with Web 2.0 -- Hack the Macs -- Wireless hacking Computer Security Pirates informatiques Réseaux d'ordinateurs Sécurité Sécurité informatique Computer networks Security measures Computer security COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Hackers |
title | Defense against the black arts how hackers do what they do and how to protect against it |
title_auth | Defense against the black arts how hackers do what they do and how to protect against it |
title_exact_search | Defense against the black arts how hackers do what they do and how to protect against it |
title_exact_search_txtP | Defense against the black arts how hackers do what they do and how to protect against it |
title_full | Defense against the black arts how hackers do what they do and how to protect against it Jesse Varsalone, Matthew McFadden ; with Sean Morrissey [and others] ; foreword by Joe McCray |
title_fullStr | Defense against the black arts how hackers do what they do and how to protect against it Jesse Varsalone, Matthew McFadden ; with Sean Morrissey [and others] ; foreword by Joe McCray |
title_full_unstemmed | Defense against the black arts how hackers do what they do and how to protect against it Jesse Varsalone, Matthew McFadden ; with Sean Morrissey [and others] ; foreword by Joe McCray |
title_short | Defense against the black arts |
title_sort | defense against the black arts how hackers do what they do and how to protect against it |
title_sub | how hackers do what they do and how to protect against it |
topic | Computer Security Pirates informatiques Réseaux d'ordinateurs Sécurité Sécurité informatique Computer networks Security measures Computer security COMPUTERS Internet COMPUTERS Networking COMPUTERS Security Hackers |
topic_facet | Computer Security Pirates informatiques Réseaux d'ordinateurs Sécurité informatique Computer networks Computer security COMPUTERS Hackers Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=405406 |
work_keys_str_mv | AT varsalonejesse defenseagainsttheblackartshowhackersdowhattheydoandhowtoprotectagainstit AT mcfaddenmatthew defenseagainsttheblackartshowhackersdowhattheydoandhowtoprotectagainstit AT morrisseysean defenseagainsttheblackartshowhackersdowhattheydoandhowtoprotectagainstit |