|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910410652903321 |
|
|
Autore |
Varsalone Jesse |
|
|
Titolo |
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, FL : , : Auerbach Publications, , [2017] |
|
©2012 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-429-10376-X |
1-283-35007-6 |
9786613350077 |
1-4398-2122-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (408 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Hackers |
Computer networks - Security measures |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon |
|
|
|
|
|
|
|