Description |
1 online resource (viii, 225 pages) : illustrations |
|
text file |
Note |
Includes index. |
Bibliography |
Includes bibliographical references and index. |
Contents |
Chapter 1. Google search basics -- chapter 2. Advanced operators -- chapter 3. Google hacking basics -- chapter 4. Document grinding and database digging -- chapter 5. Google's part in an information collection framework -- chapter 6. Locating exploits and finding targets -- chapter 7. Ten simple security searches that work -- chapter 8. Tracking down web servers, login portals, and network hardware -- chapter 9. Usernames, passwords, and secret stuff, oh my! -- chapter 10. Hacking Google services -- chapter 11. Hacking Google showcase -- chapter 12. Protecting yourself from Google hackers. |
Summary |
Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. This book shows how security professionals and system administrators manipulate Google to find sensitive information in order to "self-police" their own organizations. |
Subject |
Google.
|
|
Google |
|
Web search engines.
|
|
Computer security.
|
|
Internet programming.
|
|
Internet -- Security measures.
|
|
Computer networks -- Security measures.
|
|
Moteurs de recherche sur Internet. |
|
Sécurité informatique. |
|
Programmation Internet. |
|
Internet -- Sécurité -- Mesures. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Computer networks -- Security measures |
|
Computer security |
|
Internet programming |
|
Internet -- Security measures |
|
Web search engines |
Added Author |
Gardner, Bill, author.
|
|
Brown, Justin, author.
|
ISBN |
9780128029824 |
|
012802982X |
|
0128029641 |
|
9780128029640 |
Standard No. |
C20130142833 |
|
9780128029824 |
|