Defense against the black arts : : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden.

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hac...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Boca Raton, FL : : Auerbach Publications,, [2017]
©2012
Year of Publication:2017
Edition:1st ed.
Language:English
Physical Description:1 online resource (408 p.)
Notes:An Auerbach book.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993660434604498
ctrlnum (CKB)2550000000063055
(EBL)800926
(OCoLC)761369094
(SSID)ssj0000535737
(PQKBManifestationID)11335077
(PQKBTitleCode)TC0000535737
(PQKBWorkID)10546242
(PQKB)11077819
(MiAaPQ)EBC800926
(OCoLC)1080587572
(OCoLC-P)1080587572
(FlBoTFG)9780429103766
(MiAaPQ)EBC7245082
(EXLCZ)992550000000063055
collection bib_alma
record_format marc
spelling Varsalone, Jesse, author.
Defense against the black arts : how hackers do what they do and how to protect against it / Jesse Varsalone, Matthew McFadden.
Defense against the Black Arts
1st ed.
Boca Raton, FL : Auerbach Publications, [2017]
©2012
1 online resource (408 p.)
text txt
computer c
online resource cr
Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon
English
An Auerbach book.
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International CC BY-NC-ND 4.0 https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
Unrestricted online access star
Description based on online resource; title from PDF title page (EBook Central, viewed February 2, 2024).
Computer hackers.
Computer networks Security measures.
Computer security.
1-138-45361-7
1-4398-2119-4
McFadden, Matthew, author.
language English
format eBook
author Varsalone, Jesse,
McFadden, Matthew,
spellingShingle Varsalone, Jesse,
McFadden, Matthew,
Defense against the black arts : how hackers do what they do and how to protect against it /
Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
author_facet Varsalone, Jesse,
McFadden, Matthew,
McFadden, Matthew,
author_variant j v jv
m m mm
author_role VerfasserIn
VerfasserIn
author2 McFadden, Matthew,
author2_role TeilnehmendeR
author_sort Varsalone, Jesse,
title Defense against the black arts : how hackers do what they do and how to protect against it /
title_sub how hackers do what they do and how to protect against it /
title_full Defense against the black arts : how hackers do what they do and how to protect against it / Jesse Varsalone, Matthew McFadden.
title_fullStr Defense against the black arts : how hackers do what they do and how to protect against it / Jesse Varsalone, Matthew McFadden.
title_full_unstemmed Defense against the black arts : how hackers do what they do and how to protect against it / Jesse Varsalone, Matthew McFadden.
title_auth Defense against the black arts : how hackers do what they do and how to protect against it /
title_alt Defense against the Black Arts
title_new Defense against the black arts :
title_sort defense against the black arts : how hackers do what they do and how to protect against it /
publisher Auerbach Publications,
publishDate 2017
physical 1 online resource (408 p.)
edition 1st ed.
contents Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover
isbn 0-429-10376-X
1-283-35007-6
9786613350077
1-4398-2122-4
1-138-45361-7
1-4398-2119-4
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 V38 42017
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 761369094
1080587572
work_keys_str_mv AT varsalonejesse defenseagainsttheblackartshowhackersdowhattheydoandhowtoprotectagainstit
AT mcfaddenmatthew defenseagainsttheblackartshowhackersdowhattheydoandhowtoprotectagainstit
AT varsalonejesse defenseagainsttheblackarts
AT mcfaddenmatthew defenseagainsttheblackarts
status_str n
ids_txt_mv (CKB)2550000000063055
(EBL)800926
(OCoLC)761369094
(SSID)ssj0000535737
(PQKBManifestationID)11335077
(PQKBTitleCode)TC0000535737
(PQKBWorkID)10546242
(PQKB)11077819
(MiAaPQ)EBC800926
(OCoLC)1080587572
(OCoLC-P)1080587572
(FlBoTFG)9780429103766
(MiAaPQ)EBC7245082
(EXLCZ)992550000000063055
carrierType_str_mv cr
is_hierarchy_title Defense against the black arts : how hackers do what they do and how to protect against it /
author2_original_writing_str_mv noLinkedField
_version_ 1799170197112750080
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03237nam a22006373i 4500</leader><controlfield tag="001">993660434604498</controlfield><controlfield tag="005">20240514054618.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">231110t20172012flua o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-10376-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-283-35007-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613350077</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-4398-2122-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/b11193 </subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2550000000063055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)800926</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)761369094</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000535737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11335077</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000535737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10546242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11077819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC800926</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1080587572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1080587572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(FlBoTFG)9780429103766</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC7245082</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992550000000063055</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.V38 2017</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Varsalone, Jesse,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defense against the black arts :</subfield><subfield code="b">how hackers do what they do and how to protect against it /</subfield><subfield code="c">Jesse Varsalone, Matthew McFadden.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Defense against the Black Arts </subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL :</subfield><subfield code="b">Auerbach Publications,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (408 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">An Auerbach book.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International</subfield><subfield code="f">CC BY-NC-ND 4.0</subfield><subfield code="u">https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (EBook Central, viewed February 2, 2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer hackers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-138-45361-7</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-4398-2119-4</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McFadden, Matthew,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-05-16 02:13:36 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 02:30:30 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338538150004498&amp;Force_direct=true</subfield><subfield code="Z">5338538150004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338538150004498</subfield></datafield></record></collection>