Cargando…

Hacking: the next generation

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Ha...

Descripción completa

Detalles Bibliográficos
Autores principales: Dhanjani, Nitesh, Rios, Billy, Hardin, Brett
Lenguaje:eng
Publicado: O'Reilly 2009
Materias:
Acceso en línea:http://cds.cern.ch/record/1247932
_version_ 1780919547644084224
author Dhanjani, Nitesh
Rios, Billy
Hardin, Brett
author_facet Dhanjani, Nitesh
Rios, Billy
Hardin, Brett
author_sort Dhanjani, Nitesh
collection CERN
description With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse
id cern-1247932
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2009
publisher O'Reilly
record_format invenio
spelling cern-12479322021-04-22T01:30:20Zhttp://cds.cern.ch/record/1247932engDhanjani, NiteshRios, BillyHardin, BrettHacking: the next generationComputing and Computers With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse O'Reillyoai:cds.cern.ch:12479322009
spellingShingle Computing and Computers
Dhanjani, Nitesh
Rios, Billy
Hardin, Brett
Hacking: the next generation
title Hacking: the next generation
title_full Hacking: the next generation
title_fullStr Hacking: the next generation
title_full_unstemmed Hacking: the next generation
title_short Hacking: the next generation
title_sort hacking: the next generation
topic Computing and Computers
url http://cds.cern.ch/record/1247932
work_keys_str_mv AT dhanjaninitesh hackingthenextgeneration
AT riosbilly hackingthenextgeneration
AT hardinbrett hackingthenextgeneration