Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Google hacking for penetration testersGoogle hacking for penetration testers

Google hacking for penetration testers

Ed Skoudis, Alrik van Eijkelenborg, Johnny Long

4.0on Hardcover

About this book

Annotation You Got that With Google? What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch.

Details

OL Work ID
OL8954246W

Subjects

Computer networksComputer securityGoogleInternetInternet programmingSecurity measuresWeb search enginesPenetration testing (Computer security)Internet searchingCOMPUTERSOnline ServicesSystem AdministrationStorage & Retrieval

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.