DEFENSE AGAINST THE BLACK ARTS : : how hackers do what they do and how to protect against it.

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hac...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2017
Language:English
Physical Description:1 online resource (408 p.)
Notes:An Auerbach book.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993547452104498
ctrlnum (CKB)2550000000063055
(EBL)800926
(OCoLC)761369094
(SSID)ssj0000535737
(PQKBManifestationID)11335077
(PQKBTitleCode)TC0000535737
(PQKBWorkID)10546242
(PQKB)11077819
(MiAaPQ)EBC800926
(OCoLC)1080587572
(OCoLC-P)1080587572
(FlBoTFG)9780429103766
(EXLCZ)992550000000063055
collection bib_alma
record_format marc
spelling VARSALONE, JESSE.
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
[Place of publication not identified] CRC Press, 2017.
1 online resource (408 p.)
text txt
computer c
online resource cr
Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon
English
An Auerbach book.
OCLC-licensed vendor bibliographic record.
Computer hackers.
Computer networks Security measures.
Computer security.
1-138-45361-7
1-4398-2119-4
language English
format eBook
author VARSALONE, JESSE.
spellingShingle VARSALONE, JESSE.
DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
author_facet VARSALONE, JESSE.
author_variant j v jv
author_sort VARSALONE, JESSE.
title DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
title_sub how hackers do what they do and how to protect against it.
title_full DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
title_fullStr DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
title_full_unstemmed DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
title_auth DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
title_new DEFENSE AGAINST THE BLACK ARTS :
title_sort defense against the black arts : how hackers do what they do and how to protect against it.
publisher CRC Press,
publishDate 2017
physical 1 online resource (408 p.)
contents Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
isbn 0-429-10376-X
1-283-35007-6
9786613350077
1-4398-2122-4
1-138-45361-7
1-4398-2119-4
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 V38 42012
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 761369094
1080587572
work_keys_str_mv AT varsalonejesse defenseagainsttheblackartshowhackersdowhattheydoandhowtoprotectagainstit
status_str c
ids_txt_mv (CKB)2550000000063055
(EBL)800926
(OCoLC)761369094
(SSID)ssj0000535737
(PQKBManifestationID)11335077
(PQKBTitleCode)TC0000535737
(PQKBWorkID)10546242
(PQKB)11077819
(MiAaPQ)EBC800926
(OCoLC)1080587572
(OCoLC-P)1080587572
(FlBoTFG)9780429103766
(EXLCZ)992550000000063055
carrierType_str_mv cr
is_hierarchy_title DEFENSE AGAINST THE BLACK ARTS : how hackers do what they do and how to protect against it.
_version_ 1764985505603125248
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01267cam a2200361M 4500</leader><controlfield tag="001">993547452104498</controlfield><controlfield tag="005">20211215042403.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">190103s2017 xx o 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011014729</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-10376-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-283-35007-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613350077</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-4398-2122-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b11193 </subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2550000000063055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)800926</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)761369094</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000535737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11335077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000535737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10546242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11077819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC800926</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1080587572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1080587572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(FlBoTFG)9780429103766</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992550000000063055</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.V38 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">VARSALONE, JESSE.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">DEFENSE AGAINST THE BLACK ARTS :</subfield><subfield code="b">how hackers do what they do and how to protect against it.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2017.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (408 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">An Auerbach book.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">OCLC-licensed vendor bibliographic record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer hackers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-138-45361-7</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-4398-2119-4</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2022-12-22 03:36:25 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 02:30:30 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338538150004498&amp;Force_direct=true</subfield><subfield code="Z">5338538150004498</subfield><subfield code="8">5338538150004498</subfield></datafield></record></collection>