DEFENSE AGAINST THE BLACK ARTS : : how hackers do what they do and how to protect against it.

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hac...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2017
Language:English
Physical Description:1 online resource (408 p.)
Notes:An Auerbach book.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01267cam a2200361M 4500
001 993547452104498
005 20211215042403.0
006 m o d
007 cr |n|||||||||
008 190103s2017 xx o 000 0 eng d
010 |z  2011014729 
020 |a 0-429-10376-X 
020 |a 1-283-35007-6 
020 |a 9786613350077 
020 |a 1-4398-2122-4 
024 7 |a 10.1201/b11193   |2 doi 
035 |a (CKB)2550000000063055 
035 |a (EBL)800926 
035 |a (OCoLC)761369094 
035 |a (SSID)ssj0000535737 
035 |a (PQKBManifestationID)11335077 
035 |a (PQKBTitleCode)TC0000535737 
035 |a (PQKBWorkID)10546242 
035 |a (PQKB)11077819 
035 |a (MiAaPQ)EBC800926 
035 |a (OCoLC)1080587572 
035 |a (OCoLC-P)1080587572 
035 |a (FlBoTFG)9780429103766 
035 |a (EXLCZ)992550000000063055 
040 |a OCoLC-P  |b eng  |c OCoLC-P 
041 |a eng 
050 4 |a TK5105.59  |b .V38 2012 
082 0 0 |a 005.8 
100 1 |a VARSALONE, JESSE. 
245 1 0 |a DEFENSE AGAINST THE BLACK ARTS :  |b how hackers do what they do and how to protect against it. 
260 |a [Place of publication not identified]  |b CRC Press,  |c 2017. 
300 |a 1 online resource (408 p.) 
336 |a text  |b txt 
337 |a computer  |b c 
338 |a online resource  |b cr 
505 0 |a Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover 
520 |a As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon 
546 |a English 
500 |a An Auerbach book. 
588 |a OCLC-licensed vendor bibliographic record. 
650 0 |a Computer hackers. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
776 |z 1-138-45361-7 
776 |z 1-4398-2119-4 
906 |a BOOK 
ADM |b 2022-12-22 03:36:25 Europe/Vienna  |f system  |c marc21  |a 2012-02-26 02:30:30 Europe/Vienna  |g false 
AVE |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338538150004498&Force_direct=true  |Z 5338538150004498  |8 5338538150004498