Cargando…
Hacking: the next generation
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Ha...
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
O'Reilly
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1247932 |
_version_ | 1780919547644084224 |
---|---|
author | Dhanjani, Nitesh Rios, Billy Hardin, Brett |
author_facet | Dhanjani, Nitesh Rios, Billy Hardin, Brett |
author_sort | Dhanjani, Nitesh |
collection | CERN |
description | With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse |
id | cern-1247932 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2009 |
publisher | O'Reilly |
record_format | invenio |
spelling | cern-12479322021-04-22T01:30:20Zhttp://cds.cern.ch/record/1247932engDhanjani, NiteshRios, BillyHardin, BrettHacking: the next generationComputing and Computers With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse O'Reillyoai:cds.cern.ch:12479322009 |
spellingShingle | Computing and Computers Dhanjani, Nitesh Rios, Billy Hardin, Brett Hacking: the next generation |
title | Hacking: the next generation |
title_full | Hacking: the next generation |
title_fullStr | Hacking: the next generation |
title_full_unstemmed | Hacking: the next generation |
title_short | Hacking: the next generation |
title_sort | hacking: the next generation |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1247932 |
work_keys_str_mv | AT dhanjaninitesh hackingthenextgeneration AT riosbilly hackingthenextgeneration AT hardinbrett hackingthenextgeneration |