LEADER 03216nam 22007453 450 001 9910410652903321 005 20240613172305.0 010 $a9786613350077 010 $a9780429103766 010 $a042910376X 010 $a9781283350075 010 $a1283350076 010 $a9781439821220 010 $a1439821224 024 7 $a10.1201/b11193 035 $a(CKB)2550000000063055 035 $a(EBL)800926 035 $a(OCoLC)761369094 035 $a(SSID)ssj0000535737 035 $a(PQKBManifestationID)11335077 035 $a(PQKBTitleCode)TC0000535737 035 $a(PQKBWorkID)10546242 035 $a(PQKB)11077819 035 $a(MiAaPQ)EBC800926 035 $a(OCoLC)1080587572 035 $a(OCoLC-P)1080587572 035 $a(FlBoTFG)9780429103766 035 $a(MiAaPQ)EBC7245082 035 $a(ScCtBLL)1675323a-6dc3-40f5-9ae3-86011b6ce2a1 035 $a(EXLCZ)992550000000063055 100 $a20231110h20172012 uy 0 101 0 $aeng 135 $aur|n||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDefense against the black arts $ehow hackers do what they do and how to protect against it /$fJesse Varsalone, Matthew McFadden 205 $a1st ed. 210 1$aBoca Raton, FL :$cAuerbach Publications,$d[2017] 210 4$dİ2012 215 $a1 online resource (408 p.) 300 $aAn Auerbach book. 311 08$a9781138453616 311 08$a1138453617 311 08$a9781439821190 311 08$a1439821194 327 $aFront Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover 330 $aAs technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon 517 $aDefense against the Black Arts 606 $aHackers 606 $aComputer networks$xSecurity measures 606 $aComputer security 615 0$aHackers. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a005.8 700 $aVarsalone$b Jesse$0959798 702 $aMcFadden$b Matthew 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910410652903321 996 $aDEFENSE AGAINST THE BLACK ARTS$92883099 997 $aUNINA