Login | Sign Up | Settings | Wish List

 



Searching ...
0 %

Books by Johnny Long






Google Hacking for Penetration Testers, Third Edition, Second Edition(3rd Edition)
by Johnny Long, Bill Gardner, Justin Brown
Paperback, 234 Pages, Published 2015 by Syngress
ISBN-13: 978-0-12-802964-0, ISBN: 0-12-802964-1

"Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Goog ..."






No Tech Hacking(1st Edition)
A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
by Johnny Long, Jack Wiles, Kevin D. Mitnick, Scott Pinzon, Kevin David Mitnick
Paperback, 384 Pages, Published 2008 by Syngress
ISBN-13: 978-1-59749-215-7, ISBN: 1-59749-215-9

"在线阅读本书 As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past ..."






Google Talking(1st Edition)
by Joshua Brashars, Johnny Long, Brian Baskin, Baskin C.C, Rose M.R
Paperback, 300 Pages, Published 2007 by Syngress
Illustrated
ISBN-13: 978-1-59749-055-9, ISBN: 1-59749-055-5

"Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power o ..."






Stealing the Network(1st Edition)
How to Own a Shadow
by Johnny Long, Timothy Mullen, Ryan Russell
Paperback, 448 Pages, Published 2007 by Syngress
Illustrated
ISBN-13: 978-1-59749-081-8, ISBN: 1-59749-081-4

"The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow ..."






Google Hacking for Penetration Testers(1st Edition)
by Johnny Long, Bill Gardner, Justin Brown, Roelof Temmingh, Petko Petkov
Paperback, 560 Pages, Published 2007 by Syngress
ISBN-13: 978-1-59749-176-1, ISBN: 1-59749-176-4

"A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because I've seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff. ..."






Stealing the Network(1st Edition)
The Complete Series Collector's Edition, Final Chapter, and DVD
by Johnny Long, Ryan Russell, Timothy Mullen
Hardcover, 1,082 Pages, Published 2009 by Syngress
ISBN-13: 978-1-59749-299-7, ISBN: 1-59749-299-X

""Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will ..."






Penetration Tester's Open Source Toolkit(1st Edition)
by Jay Beale, Roelof Temmingh, Haroon Meer, Jeremy Faircloth, Hd Moore, Johnny Long, Chris Hurley, James C. Foster, Mike Petruzzi
Paperback, 750 Pages, Published 2005 by Syngress
Illustrated
ISBN-13: 978-1-59749-021-4, ISBN: 1-59749-021-0

"Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leadin ..."






INFOSEC CAREER HACKING(1st Edition)
SELL YOUR SKILLZ, NOT YOUR SOUL (PB 2005)
by Chris Hurley, Johnny Long, Ed Brindley, Aaron W. Bayles, James C. Foster, Christopher W. Klaus
Paperback, 448 Pages, Published 2005 by Syngress
Illustrated
ISBN-13: 978-1-59749-011-5, ISBN: 1-59749-011-3

"“InfoSec Career Hacking” starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can ..."






Google Hacking for Penetration Testers, Volume 1(1st Edition)
by Johnny Long, Ed Skoudis, Alrik Van Eijkelenborg, Jen Long, Chris Beauchamp
Paperback, 448 Pages, Published 2005 by Syngress
Illustrated
ISBN-13: 978-1-931836-36-4, ISBN: 1-931836-36-1

""Understanding the adversary mindset is an important element in designing and developing effective protective strategies."—Amit Yoran, Former Director of the National Cyber Security Division, Department of Homeland Security Explore the Dark Side of Googling Morph Google from "Directory Assistance Please" into a Rig Mounted Pneumatic Rock Drill   See How Bad Guys Use Portscans, CGI Scans, and Web Server Fingerprinting to Stroll in t ..."






No Tech Hacking
A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
by Johnny Long, Kevin D. Mitnick
Paperback, 384 Pages, Published 2011 by Syngress Publishing
ISBN-13: 978-0-08-055875-2, ISBN: 0-08-055875-5

"Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover wea ..."






Techno Security's Guide to Managing Risks(1st Edition)
For IT Managers, Auditors, and Investigators
by Jack Wiles, Johnny Long, Russ Rogers, Phil Drake, Ron J. Green, Greg Kipper, Raymond Todd Blackwood, Amber Schroader
Digital, 432 Pages, Published 2011 by Syngress
ISBN-13: 978-0-08-055397-9, ISBN: 0-08-055397-4

"“This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow’s headlines, whereas others have been arou ..."






Stealing the Network
How to Own a Shadow
by Johnny Long, Timothy Mullen, Ryan Russell
448 Pages, Published 2011 by Syngress
ISBN-13: 978-0-08-051775-9, ISBN: 0-08-051775-7

"While we are eternally grateful to the past authors and contributors of the series, any one of us who has previously served as an editor (all three of us have been technical editors for the “Stealing” books at one point or another) can tell you how ... Enter Scott Pinzon. Scott has really helped all three of us become better fiction writers, and we are all very grateful for his sharing of his invaluable experience ( even if it was a ..."






OS X Exploits and Defense
Own It... Just Like Windows or Linux!
by Paul Baccas, Kevin Finisterre, David Harley, Larry H., Johnny Long, Chris Hurley, Gary Porteus, Gareth Porteous
352 Pages, Published 2011 by Syngress
ISBN-13: 978-0-08-055876-9, ISBN: 0-08-055876-3

"Just Like Windows or Linux! Paul Baccas, Kevin Finisterre, Larry H., David Harley , Gary Porteus, Chris Hurley, Johnny Long. third layer of the TCP/IP model of a packet, called the Network Layer. The following shows the basic layers for TCP/IP protocols according to this design: The Five-Layer TCP/IP Model 5 - Application Layer HTTP, SSL/TLS, SSH, FTP, SMTP, POP, IMAP, DNS, DHCP, etc. | 4 - Transport Layer TCP, UDP, etc | 3 - Networ ..."






Google Hacking for Penetration Testers, Volume 2
by Johnny Long, Bill Gardner, Justin Brown
Digi Or Mm/Electronic Book Text, 560 Pages, Published 2011 by Syngress
ISBN-13: 978-0-08-048426-6, ISBN: 0-08-048426-3

"... *.xxx.gov Names (Person) : audrey sch's # * Corina mo% # * * frank mak # k k eileen was # * * saic-odin – # * * * ha Chris will k + k # nand lal k + k # Susan ho k + k # john jaa' = * * dr. paul a cu% # * * * * * project/code 470 bill ... lucero ja" * * * jenny rumb' k + k blade ruk k k # limit Odi k + k k * * * * odin/osf seat Scott w . mci + k k # philip t. me" x * * annie ki> * * * USernames : cgro* * * * * * * * WWW. SYTYCIC ..."






Stealing the Network
The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
by Johnny Long, Ryan Russell, Timothy M. Mullen
1,080 Pages, Published 2009 by Syngress
ISBN-13: 978-0-08-094920-8, ISBN: 0-08-094920-7

"The white box becomes a data file with the extension .bmp, and that's what she is after... CHAPTER 18 The Story of Dex Paul Craig as “Dex”..................................417 The dim light fills the room with a dull, eerie glow, and in the midst of the paperwork-filled ... I buy a ticket for Las Vegas; it's the next bus to leave that goes to one of my cities, which seems somehow appropriate. ... Prologue: From the Diary of Robert ..."






Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
by Jack Wiles, Johnny Long, Russ Rogers, Ron J. Green, Greg Kipper, Phil Drake, Raymond Todd Blackwood, Amber Schroader, Eric Cole Dr., Dennis O'brien, Kevin O'shea, Donald Withers
Paperback, 430 Pages, Published 2007 by Syngress
ISBN-13: 978-1-59749-138-9, ISBN: 1-59749-138-1

"“This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow’s headlines, whereas others have been arou ..."






Google Talking
by Johnny Long, Joshua Brashars, Brian Baskin
300 Pages, Published 2006 by Elsevier
ISBN-13: 978-0-08-048887-5, ISBN: 0-08-048887-0

"James C. Foster Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and ..."






Google Hacking for Penetration Testers
by Johnny Long
Paperback, 529 Pages, Published 2005 by Syngress Publishing
ISBN-13: 978-0-08-047805-0, ISBN: 0-08-047805-0

"Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hack ..."






InfoSec Career Hacking
Sell Your Skillz, Not Your Soul: Sell Your Skillz, Not Your Soul
by Aaron W. Bayles, Johnny Long, Chris Hurley, Ed Brindley
448 Pages, Published 2005 by Elsevier
ISBN-13: 978-0-08-048903-2, ISBN: 0-08-048903-6

"Without virtualization, this means reloading the operating system every single time malicious code is loaded to prevent possible infection. Running the code in a virtual session, however, we could simply reload the virtual machine file after completing our analysis, or use any number of write-protect options to keep changes to the virtual machine from “sticking.” For more information about this topic, check out “Malware: Fighting M ..."






OS X for Hackers at Heart(1st Edition)
by Bruce Potter, Johnny Long, Chris Hurley, Tom Owad, Russ Rogers, Preston Norvell, Ken Caruso
Paperback, 512 Pages, Published 2005 by Syngress
Illustrated
ISBN-13: 978-1-59749-040-5, ISBN: 1-59749-040-7

"The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker’s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world’s foremost “true hackers” unleash the power of OS X for everything form cutting edge research and development to just plain old fun.OS X 10.4 Tiger is a major upgrade for Mac OS X fo ..."



Continue Search >>

All Authors

Johnny Long

Chris Hurley

Timothy Mullen

Ryan Russell

Bill Gardner

Joshua Brashars

Justin Brown

Russ Rogers

Jay Beale

Jack Wiles


All Bindings

Unknown

Paperback

Hardcover

CD

DVD

eBook


All Editions

1st Edition

2nd Edition

3rd Edition

Other

Updated


All Years

2018 - 2018

2016 - 2018

2014 - 2016

2010 - 2012

2008 - 2010

2006 - 2008

2004 - 2006


All Regions

English

Uknown

German

Italy

French

Korea

China

India

Brazil