Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
[2016]
|
Ausgabe: | Third edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128029824/?ar |
Zusammenfassung: | Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. This book shows how security professionals and system administrators manipulate Google to find sensitive information in order to "self-police" their own organizations. |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 14, 2015) |
Umfang: | 1 Online-Ressource (viii, 225 pages) illustrations |
ISBN: | 9780128029824 012802982X 0128029641 9780128029640 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047407387 | ||
003 | DE-627-1 | ||
005 | 20240228120017.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2016 xx |||||o 00| ||eng c | ||
020 | |a 9780128029824 |9 978-0-12-802982-4 | ||
020 | |a 012802982X |9 0-12-802982-X | ||
020 | |a 0128029641 |9 0-12-802964-1 | ||
020 | |a 9780128029640 |9 978-0-12-802964-0 | ||
035 | |a (DE-627-1)047407387 | ||
035 | |a (DE-599)KEP047407387 | ||
035 | |a (ORHE)9780128029824 | ||
035 | |a (DE-627-1)047407387 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 025.04 |2 22 | |
100 | 1 | |a Long, Johnny |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Google hacking for penetration testers |c Johnny Long, Bill Gardner, Justin Brown |
250 | |a Third edition. | ||
264 | 1 | |a Waltham, MA |b Syngress |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 Online-Ressource (viii, 225 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 14, 2015) | ||
520 | |a Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. This book shows how security professionals and system administrators manipulate Google to find sensitive information in order to "self-police" their own organizations. | ||
630 | 2 | 0 | |a Google |
650 | 0 | |a Web search engines | |
650 | 0 | |a Computer security | |
650 | 0 | |a Internet programming | |
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Google | |
650 | 4 | |a Moteurs de recherche sur Internet | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Programmation Internet | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet programming | |
650 | 4 | |a Internet ; Security measures | |
650 | 4 | |a Web search engines | |
700 | 1 | |a Gardner, Bill |e VerfasserIn |4 aut | |
700 | 1 | |a Brown, Justin |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128029824/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047407387 |
---|---|
_version_ | 1835903222332522497 |
adam_text | |
any_adam_object | |
author | Long, Johnny Gardner, Bill Brown, Justin |
author_facet | Long, Johnny Gardner, Bill Brown, Justin |
author_role | aut aut aut |
author_sort | Long, Johnny |
author_variant | j l jl b g bg j b jb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047407387 (DE-599)KEP047407387 (ORHE)9780128029824 |
dewey-full | 025.04 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 025 - Operations of libraries and archives |
dewey-raw | 025.04 |
dewey-search | 025.04 |
dewey-sort | 225.04 |
dewey-tens | 020 - Library and information sciences |
discipline | Allgemeines |
edition | Third edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02608cam a22006252c 4500</leader><controlfield tag="001">ZDB-30-ORH-047407387</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120017.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128029824</subfield><subfield code="9">978-0-12-802982-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012802982X</subfield><subfield code="9">0-12-802982-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128029641</subfield><subfield code="9">0-12-802964-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128029640</subfield><subfield code="9">978-0-12-802964-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047407387</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047407387</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128029824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047407387</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">025.04</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Google hacking for penetration testers</subfield><subfield code="c">Johnny Long, Bill Gardner, Justin Brown</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 225 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 14, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. This book shows how security professionals and system administrators manipulate Google to find sensitive information in order to "self-police" their own organizations.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Google</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web search engines</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Google</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Moteurs de recherche sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programmation Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web search engines</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gardner, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brown, Justin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128029824/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047407387 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:50Z |
institution | BVB |
isbn | 9780128029824 012802982X 0128029641 9780128029640 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (viii, 225 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Syngress |
record_format | marc |
spelling | Long, Johnny VerfasserIn aut Google hacking for penetration testers Johnny Long, Bill Gardner, Justin Brown Third edition. Waltham, MA Syngress [2016] ©2016 1 Online-Ressource (viii, 225 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed December 14, 2015) Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. This book shows how security professionals and system administrators manipulate Google to find sensitive information in order to "self-police" their own organizations. Web search engines Computer security Internet programming Internet Security measures Computer networks Security measures Moteurs de recherche sur Internet Sécurité informatique Programmation Internet Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Gardner, Bill VerfasserIn aut Brown, Justin VerfasserIn aut |
spellingShingle | Long, Johnny Gardner, Bill Brown, Justin Google hacking for penetration testers Web search engines Computer security Internet programming Internet Security measures Computer networks Security measures Moteurs de recherche sur Internet Sécurité informatique Programmation Internet Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
title | Google hacking for penetration testers |
title_auth | Google hacking for penetration testers |
title_exact_search | Google hacking for penetration testers |
title_full | Google hacking for penetration testers Johnny Long, Bill Gardner, Justin Brown |
title_fullStr | Google hacking for penetration testers Johnny Long, Bill Gardner, Justin Brown |
title_full_unstemmed | Google hacking for penetration testers Johnny Long, Bill Gardner, Justin Brown |
title_short | Google hacking for penetration testers |
title_sort | google hacking for penetration testers |
topic | Google Web search engines Computer security Internet programming Internet Security measures Computer networks Security measures Moteurs de recherche sur Internet Sécurité informatique Programmation Internet Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
topic_facet | Google Web search engines Computer security Internet programming Internet Security measures Computer networks Security measures Moteurs de recherche sur Internet Sécurité informatique Programmation Internet Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures |
work_keys_str_mv | AT longjohnny googlehackingforpenetrationtesters AT gardnerbill googlehackingforpenetrationtesters AT brownjustin googlehackingforpenetrationtesters |