It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 07635cam 2201105Ia 4500
001 ocm57308594
003 OCoLC
005 20220212022030.0
008 041221s2005 mau o 001 0 eng d
006 m o d
007 cr cnu|unuuu||
040 $aN$T$beng$epn$cN$T$dOCLCQ$dOCLCO$dOCLCQ$dOCLCF$dDKDLA$dREDDC$dS4S$dNTG$dBMU$dCEF$dEBLCP$dZCU$dMERUC$dCCO$dE7B$dOPELS$dOKU$dFVL$dNLGGC$dAU@$dYDXCP$dIDEBK$dDEBSZ$dOCLCQ$dUMI$dMUX$dOCLCQ$dCOO$dOCLCQ$dAZK$dCOCUF$dCNNOR$dSUR$dPIFBR$dOCLCQ$dSAV$dOCLCQ$dOCLCO$dWY@$dU3W$dLUE$dSTF$dBRL$dWRM$dD6H$dNRAMU$dICG$dINT$dVT2$dTOF$dOCLCQ$dOCLCO$dG3B$dTKN$dOCLCQ$dOCLCO$dPUG$dLEAUB$dDKC$dOCLCQ$dM8D$dOCLCQ
019 $a62792944$a70746517$a85789357$a122347573$a162598728$a181838823$a191034957$a475411152$a475723395$a507200730$a559434557$a646725673$a722324608$a728022500$a780914879$a823829937$a823899644$a824090912$a824138673$a856957715$a888766763$a961530387$a962663714$a1037508542
020 $a159749013X$q(electronic bk.)
020 $a9781597490139$q(electronic bk.)
020 $a1931836361
020 $a9781931836364
020 $a9780080478050
020 $a0080478050
020 $a1281055948
020 $a9781281055941
035 $a(OCoLC)57308594$z(OCoLC)62792944$z(OCoLC)70746517$z(OCoLC)85789357$z(OCoLC)122347573$z(OCoLC)162598728$z(OCoLC)181838823$z(OCoLC)191034957$z(OCoLC)475411152$z(OCoLC)475723395$z(OCoLC)507200730$z(OCoLC)559434557$z(OCoLC)646725673$z(OCoLC)722324608$z(OCoLC)728022500$z(OCoLC)780914879$z(OCoLC)823829937$z(OCoLC)823899644$z(OCoLC)824090912$z(OCoLC)824138673$z(OCoLC)856957715$z(OCoLC)888766763$z(OCoLC)961530387$z(OCoLC)962663714$z(OCoLC)1037508542
037 $aEBL218363$beBook Library$nhttp://www.eblib.com
050 4 $aTK5105.885.G66$bL66 2005eb
072 7 $aCOM$x069010$2bisacsh
072 7 $aCOM$x030000$2bisacsh
072 7 $aUZF$2bicssc
082 04 $a025.04$222
100 1 $aLong, Johnny.
245 10 $aGoogle hacking for penetration testers /$cJohnny Long ; foreword by Ed Skoudis.
260 $aRockland, Mass. :$bSyngress,$c©2005.
300 $a1 online resource
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file$2rda
505 0 $aGoogle searching basics -- Advanced operators -- Google hacking basics -- Pre-assessment -- Network mapping -- Locating exploits and finding targets -- Ten simple security searches that work -- Tracking down web servers, login portals, and network hardware -- Usernames, passwords, and secret stuff, oh my! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google searches / James C. Foster.
520 8 $aAnnotation$bPenetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.
520 8 $aAnnotation$bYou Got that With Google? What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch.
630 00 $aGoogle.
630 07 $aGoogle.$2blmlsh
630 07 $aGoogle.$2fast$0(OCoLC)fst01398583
650 0 $aWeb search engines.
650 0 $aInternet searching.
650 0 $aInternet programming.
650 7 $aCOMPUTERS$xOnline Services.$2bisacsh
650 7 $aCOMPUTERS$xSystem Administration$xStorage & Retrieval.$2bisacsh
650 7 $aWeb search engines.$2blmlsh
650 7 $aInternet searching.$2blmlsh
650 7 $aInternet programming.$2blmlsh
650 7 $aInternet programming.$2fast$0(OCoLC)fst00977281
650 7 $aInternet searching.$2fast$0(OCoLC)fst00977289
650 7 $aWeb search engines.$2fast$0(OCoLC)fst01173234
653 $aAndre fag (naturvidenskab og teknik)$aAndre fag
655 4 $aElectronic books.
655 0 $aElectronic books.
776 08 $iPrint version:$aLong, Johnny.$tGoogle hacking for penetration testers.$dRockland, Mass. : Syngress, ©2005$z9781931836364$w(OCoLC)57496423
856 40 $3Books24x7$uhttp://www.books24x7.com/marc.asp?isbn=1931836361
856 40 $3Books24x7$uhttp://www.books24x7.com/marc.asp?bookid=9402
856 40 $3ebrary$uhttp://site.ebrary.com/id/10070405
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=123959
856 40 $3MyiLibrary$uhttp://www.myilibrary.com?id=105594
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=294147
856 40 $3ProQuest Ebook Central$uhttps://login.gbcprx01.georgebrown.ca/login?url=http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=294147
856 40 $3Safari Books Online$uhttp://proquest.safaribooksonline.com/1931836361
856 40 $3ScienceDirect$uhttp://www.sciencedirect.com/science/book/9781931836364
856 40 $3ScienceDirect$uhttp://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781931836364
856 40 $zFull text available from Referex Security and Networking$uhttp://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836364
856 41 $3MyiLibrary, Table of contents$uhttp://www.myilibrary.com?id=105594&ref=toc
856 4 $3Cover$uhttp://swbplus.bsz-bw.de/bsz355391899cov.htm$v20130130115144
856 4 $3Volltext$uhttp://proquest.tech.safaribooksonline.de/1931836361$xVerlag
856 40 $3EBSCOhost$uhttps://libproxy.washjeff.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=123959
856 40 $3ScienceDirect$uhttps://ezproxy.aub.edu.lb/login?url=http://www.sciencedirect.com/science/book/9781931836364$zClick for electronic access to e-book.
938 $aProQuest Ebook Central$bEBLB$nEBL218363
938 $aebrary$bEBRY$nebr10070405
938 $aEBSCOhost$bEBSC$n123959
938 $aProQuest MyiLibrary Digital eBook Collection$bIDEB$n105594
938 $aYBP Library Services$bYANK$n2360390
938 $aYBP Library Services$bYANK$n2613255
029 1 $aAU@$b000048757249
029 1 $aAU@$b000051860003
029 1 $aAU@$b000053246795
029 1 $aCHNEW$b001004776
029 1 $aDEBBG$bBV042307377
029 1 $aDEBBG$bBV044124167
029 1 $aDEBSZ$b355391899
029 1 $aDEBSZ$b405314043
029 1 $aDEBSZ$b430397364
029 1 $aDEBSZ$b449065677
029 1 $aGBVCP$b785347151
029 1 $aHEBIS$b291465382
029 1 $aNZ1$b12018934
029 1 $aAU@$b000054936763
994 $aZ0$bP4A
948 $hHELD BY P4A - 1471 OTHER HOLDINGS