000 | 01699cam a2200349Ii 4500 | ||
---|---|---|---|
001 | 9780429103766 | ||
008 | 180331s2012 fluad ob 001 0 eng d | ||
020 |
_a9780429103766 _q(e-book : PDF) |
||
020 |
_z9781138453616 _q(hardback) |
||
020 |
_z9781439821190 _q(paperback) |
||
024 | 7 |
_a10.1201/b11193 _2doi |
|
035 | _a(OCoLC)761369094 | ||
050 | 4 |
_aTK5105.59 _b.V38 2012 |
|
082 | 0 | 4 |
_a005.8 _bV325 |
100 | 1 |
_aVarsalone, Jesse., _eauthor. _94466 |
|
245 | 1 | 0 |
_aDefense against the black arts : _bhow hackers do what they do and how to protect against it / _cJesse Varsalone, Matthew McFadden ; with Sean Morrissey. [and others] ; foreword by Joe McCray. |
264 | 1 |
_aBoca Raton, Fla. : _bCRC Press, _c2012. |
|
300 | _a1 online resource (xvi, 396 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aAn Auerbach book. | ||
505 | 0 | _a1. Hacking Windows OS -- 2. Obtaining Windows passwords -- 3. Imaging and extraction -- 4. Bypassing Web filters -- 5. Manipulating the Web -- 6. Finding it all on the Net -- 7. Research time -- 8. Capturing network traffic -- 9. Research time : finding the vulnerabilities -- 10. Metasploit -- 11. Other attack tools -- 12. Social engineering with Web 2.0 -- 13. Hack the Macs -- 14. Wireless hacking. | |
650 | 0 |
_aComputer hackers. _923875 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _94467 |
|
650 | 0 | _aComputer security. | |
700 | 1 |
_aMcFadden, Matthew. _94472 |
|
700 | 1 |
_aMorrissey, Sean. _94473 |
|
776 | 0 | 8 |
_iPrint version: _z9781138453616 |
856 | 4 | 0 |
_uhttps://www.taylorfrancis.com/books/9781439821220 _zTaylor & Francis . |
942 | _cEBK | ||
999 |
_c3547 _d3547 |