Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Sebastopol, Calif.
O'Reilly
2009
|
Edition: | 1st ed. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780596806309/?ar |
Summary: | With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul. |
Item Description: | Includes index. - Title viewed on screen (Safari, viewed September 3, 2009). - Print version record |
Physical Description: | 1 Online-Ressource illustrations |
ISBN: | 9780596806309 0596806302 0596154577 9780596154578 9781449379216 1449379214 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047497599 | ||
003 | DE-627-1 | ||
005 | 20240228114433.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2009 xx |||||o 00| ||eng c | ||
020 | |a 9780596806309 |9 978-0-596-80630-9 | ||
020 | |a 0596806302 |9 0-596-80630-2 | ||
020 | |a 0596154577 |9 0-596-15457-7 | ||
020 | |a 9780596154578 |9 978-0-596-15457-8 | ||
020 | |a 9781449379216 |9 978-1-4493-7921-6 | ||
020 | |a 1449379214 |9 1-4493-7921-4 | ||
035 | |a (DE-627-1)047497599 | ||
035 | |a (DE-599)KEP047497599 | ||
035 | |a (ORHE)9780596806309 | ||
035 | |a (DE-627-1)047497599 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/4 | |
084 | |a ST 276 |2 rvk | ||
084 | |a ST 277 |2 rvk | ||
100 | 1 | |a Dhanjani, Nitesh |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking |b the next generation |c by Nitesh Dhanjani, Billy Rios, Brett Hardin |
250 | |a 1st ed. | ||
264 | 1 | |a Sebastopol, Calif. |b O'Reilly |c 2009 | |
300 | |a 1 Online-Ressource |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Title viewed on screen (Safari, viewed September 3, 2009). - Print version record | ||
520 | |a With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul. | ||
650 | 0 | |a Hackers | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Rios, Billy |e MitwirkendeR |4 ctb | |
700 | 1 | |a Hardin, Brett |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780596154578 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780596154578 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780596806309/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
936 | r | v | |a ST 276 |
936 | r | v | |a ST 277 |
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047497599 |
---|---|
_version_ | 1835903206594445312 |
adam_text | |
any_adam_object | |
author | Dhanjani, Nitesh |
author2 | Rios, Billy Hardin, Brett |
author2_role | ctb ctb |
author2_variant | b r br b h bh |
author_facet | Dhanjani, Nitesh Rios, Billy Hardin, Brett |
author_role | aut |
author_sort | Dhanjani, Nitesh |
author_variant | n d nd |
building | Verbundindex |
bvnumber | localTUM |
classification_rvk | ST 276 ST 277 |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047497599 (DE-599)KEP047497599 (ORHE)9780596806309 |
dewey-full | 005.8/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/4 |
dewey-search | 005.8/4 |
dewey-sort | 15.8 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02807cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-047497599</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114433.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2009 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596806309</subfield><subfield code="9">978-0-596-80630-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596806302</subfield><subfield code="9">0-596-80630-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596154577</subfield><subfield code="9">0-596-15457-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596154578</subfield><subfield code="9">978-0-596-15457-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781449379216</subfield><subfield code="9">978-1-4493-7921-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1449379214</subfield><subfield code="9">1-4493-7921-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047497599</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047497599</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780596806309</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047497599</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/4</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dhanjani, Nitesh</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking</subfield><subfield code="b">the next generation</subfield><subfield code="c">by Nitesh Dhanjani, Billy Rios, Brett Hardin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, Calif.</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Title viewed on screen (Safari, viewed September 3, 2009). - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rios, Billy</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hardin, Brett</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780596154578</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780596154578</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780596806309/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 276</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 277</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047497599 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:35Z |
institution | BVB |
isbn | 9780596806309 0596806302 0596154577 9780596154578 9781449379216 1449379214 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | O'Reilly |
record_format | marc |
spelling | Dhanjani, Nitesh VerfasserIn aut Hacking the next generation by Nitesh Dhanjani, Billy Rios, Brett Hardin 1st ed. Sebastopol, Calif. O'Reilly 2009 1 Online-Ressource illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Title viewed on screen (Safari, viewed September 3, 2009). - Print version record With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vul. Hackers Computer networks Security measures Computer security Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer hackers Computer networks ; Security measures Rios, Billy MitwirkendeR ctb Hardin, Brett MitwirkendeR ctb 9780596154578 Erscheint auch als Druck-Ausgabe 9780596154578 |
spellingShingle | Dhanjani, Nitesh Hacking the next generation Hackers Computer networks Security measures Computer security Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer hackers Computer networks ; Security measures |
title | Hacking the next generation |
title_auth | Hacking the next generation |
title_exact_search | Hacking the next generation |
title_full | Hacking the next generation by Nitesh Dhanjani, Billy Rios, Brett Hardin |
title_fullStr | Hacking the next generation by Nitesh Dhanjani, Billy Rios, Brett Hardin |
title_full_unstemmed | Hacking the next generation by Nitesh Dhanjani, Billy Rios, Brett Hardin |
title_short | Hacking |
title_sort | hacking the next generation |
title_sub | the next generation |
topic | Hackers Computer networks Security measures Computer security Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer hackers Computer networks ; Security measures |
topic_facet | Hackers Computer networks Security measures Computer security Pirates informatiques Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer hackers Computer networks ; Security measures |
work_keys_str_mv | AT dhanjaninitesh hackingthenextgeneration AT riosbilly hackingthenextgeneration AT hardinbrett hackingthenextgeneration |