01898nam a2200313 i 4500991001506509707536100325s2009 cc a 001 0 eng d9780596154578b14025334-39ule_instDip.to Ingegneria dell'Innovazioneeng005.8422Dhanjani, Nitesh476228Hacking :the next generation /Nitesh Dhanjani, Billy Rios, and Brett HardinBeijing :O'Reilly,c2009xiii, 279 p. :ill. ;24 cmIncludes index"Bringing the attack to your network." -- Cover, p.1.Intelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectivesComputer securityInternetSecurity measuresRios, Billyauthorhttp://id.loc.gov/vocabulary/relators/aut731858Hardin, Brett.b1402533428-01-1425-11-11991001506509707536LE026 005.84 D DHA 01.01 C.1 2009C.112026000059877le026Prof. Tommasi / BibliotecapE35.43-n- 10000.i1535169525-11-11LE026 005.84 D DHA 01.01 C.2 2009C.212026000059884le026Prof. Tommasi / BibliotecapE35.43-l- 03130.i1535170125-11-11Hacking1441931UNISALENTOle02625-03-10ma -engcc 00