000 | 03630cam a2200577Ii 4500 | ||
---|---|---|---|
001 | ocn929448543 | ||
003 | OCoLC | ||
005 | 20190328114813.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 151116s2016 mau o 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dIDEBK _dN$T _dOCLCO _dYDXCP _dOCLCF _dOCLCO _dOPELS _dCDX _dCOO _dTEFOD _dOCLCQ _dOCLCA _dU3W _dD6H _dUWW |
||
019 | _a930332949 | ||
020 |
_a9780128029824 _q(electronic bk.) |
||
020 |
_a012802982X _q(electronic bk.) |
||
020 | _z9780128029640 | ||
035 |
_a(OCoLC)929448543 _z(OCoLC)930332949 |
||
050 | 4 | _aTK5105.885.G66 | |
072 | 7 |
_aLAN _x025000 _2bisacsh |
|
082 | 0 | 4 |
_a025.04252 _223 |
082 | 0 | 4 |
_a025.04 _222 |
100 | 1 |
_aLong, Johnny, _eauthor. |
|
245 | 1 | 0 |
_aGoogle hacking for penetration testers / _h[electronic resource] _cJohnny Long, Bill Gardner, Justin Brown. |
250 | _a3rd ed. | ||
264 | 1 |
_aWaltham, MA : _bElsevier Ltd., _c2016. |
|
300 | _a1 online resource (viii, 225 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
588 | 0 | _aVendor-supplied metadata. | |
505 | 0 | _aGoogle Search Basics -- Advanced Operators -- Google Hacking Basics -- Document Grinding and Database Digging -- Google's Part in an Information Collection Framework -- Locating Exploits and Finding Targets -- Ten Simple Security Searches That Work -- Tracking Down Web Servers, Login Portals, and Network Hardware -- Usernames, Passwords, and Secret Stuff, Oh My! -- Hacking Google Services -- Hacking Google Showcase -- Protecting Yourself from Google Hackers. | |
520 | _a"Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing."--Page 4 of cover. | ||
630 | 0 | 0 | _aGoogle. |
630 | 0 | 7 |
_aGoogle. _2fast _0(OCoLC)fst01398583 |
650 | 0 | _aWeb search engines. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aInternet programming. | |
650 | 0 |
_aInternet _xSecurity measures. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aLANGUAGE ARTS & DISCIPLINES / Library & Information Science / General _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aInternet programming. _2fast _0(OCoLC)fst00977281 |
|
650 | 7 |
_aInternet _xSecurity measures. _2fast _0(OCoLC)fst01751426 |
|
650 | 7 |
_aWeb search engines. _2fast _0(OCoLC)fst01173234 |
|
655 | 4 | _aElectronic books. | |
700 | 1 |
_aGardner, Bill, _eauthor. |
|
700 | 1 |
_aBrown, Justin, _eauthor. |
|
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128029640 |
999 |
_c247223 _d247223 |