Defense against the Black Arts : How Hackers Do What They Do and How to Protect against It (Record no. 53714)

MARC details
000 -LEADER
fixed length control field 03846naaaa2200613uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/28811
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number b11193
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/b11193
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
072 #7 - SUBJECT CATEGORY CODE
Subject category code KJMV5
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UB
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UT
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Varsalone, Jesse
Relationship auth
245 10 - TITLE STATEMENT
Title Defense against the Black Arts : How Hackers Do What They Do and How to Protect against It
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Taylor & Francis
Date of publication, distribution, etc. 2012
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (412 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you‘ll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one‘s IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by-nc-nd/4.0/
Source of term cc
-- https://creativecommons.org/licenses/by-nc-nd/4.0/
546 ## - LANGUAGE NOTE
Language note English
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Production & quality control management
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology: general issues
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networking & communications
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term bicssc
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IT Security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Management of IT
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Networks
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term InfoSECURITY
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term SCI-TECH
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ITECH
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term INFORMATIONSCIENCE
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term STM
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term command
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term domain
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term internet
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term live
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term machine
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term name
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term prompt
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term protocol
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term system
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term virtual
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McFadden, Matthew
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Morrissey, Sean
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schearer, Michael
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name “Kelly” Brown, James
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name “TheXile” Smith, Ben
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McCray, Joe
Relationship auth
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/41766/4/9781138453616.pdf">https://library.oapen.org/bitstream/20.500.12657/41766/4/9781138453616.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/41766/4/9781138453616.pdf">https://library.oapen.org/bitstream/20.500.12657/41766/4/9781138453616.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/28811">https://directory.doabooks.org/handle/20.500.12854/28811</a>
Access status 0
Public note DOAB: description of the publication

No items available.