LEADER 01898nam a2200313 i 4500 001 991001506509707536 008 100325s2009 cc a 001 0 eng d 020 $a9780596154578 035 $ab14025334-39ule_inst 040 $aDip.to Ingegneria dell'Innovazione$beng 082 0 $a005.84$222 100 1 $aDhanjani, Nitesh$0476228 245 10$aHacking :$bthe next generation /$cNitesh Dhanjani, Billy Rios, and Brett Hardin 260 $aBeijing :$bO'Reilly,$cc2009 300 $axiii, 279 p. :$bill. ;$c24 cm 500 $aIncludes index 500 $a"Bringing the attack to your network." -- Cover, p.1. 505 0 $aIntelligence gathering: peering through the windows to your organization -- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch -- Blended threats: when applications exploit each other -- Closed insecurity: sharing the cloud with your enemy -- Abusing mobile devices: targeting your mobile workforce -- Infiltrating the phishing underground: learning from online criminals? -- Influencing your victims: do what we tell you, please -- Hacking executives: can your CEO spot a targeted attack -- Case studies: different perspectives 650 4$aComputer security 650 4$aInternet$xSecurity measures 700 1 $aRios, Billy$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0731858 700 1 $aHardin, Brett 907 $a.b14025334$b28-01-14$c25-11-11 912 $a991001506509707536 945 $aLE026 005.84 D DHA 01.01 C.1 2009$cC.1$g1$i2026000059877$lle026$nProf. Tommasi / Biblioteca$op$pE35.43$q-$rn$s- $t1$u0$v0$w0$x0$y.i15351695$z25-11-11 945 $aLE026 005.84 D DHA 01.01 C.2 2009$cC.2$g1$i2026000059884$lle026$nProf. Tommasi / Biblioteca$op$pE35.43$q-$rl$s- $t0$u3$v1$w3$x0$y.i15351701$z25-11-11 996 $aHacking$91441931 997 $aUNISALENTO 998 $ale026$b25-03-10$cm$da $e-$feng$gcc $h0$i0