WorldCat Identities

Long, Johnny

Overview
Works: 33 works in 230 publications in 7 languages and 12,957 library holdings
Genres: Fiction  Short stories  Case studies 
Roles: Author, Editor, Creator, Other
Publication Timeline
.
Most widely held works by Johnny Long
Google hacking for penetration testers by Johnny Long( )

66 editions published between 2004 and 2016 in 7 languages and held by 2,137 WorldCat member libraries worldwide

O'Reilly. Annotation 2004 Book News, Inc., Portland, OR (booknews.com)
Stealing the network : how to own a shadow: the chase for Knuth by Johnny Long( )

30 editions published between 2006 and 2014 in English and held by 1,873 WorldCat member libraries worldwide

This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page
Stealing the network : how to own an identity( )

10 editions published in 2005 in English and held by 1,586 WorldCat member libraries worldwide

"The first two books in this series, Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent, have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. But what happens when the tables turn, and the criminal hackers become the targets of both law enforcement and each other? What happens when they must evade detection by creating new identities and applying their skills to get out fast and vanish into thin air? In Stealing the Network: How to Own an Identity, the hacker crew you've grown to both love and hate find themselves on the run, fleeing from both authority and adversary. They must now use their prowess in a way they never expected - to survive."--Jacket
Google talking by Brian Baskin( )

17 editions published between 2006 and 2007 in English and Undetermined and held by 1,554 WorldCat member libraries worldwide

"An easy-to-read guide packed with tips and tricks on Google talk. Call home without spending an arm and a leg; Make calls from your computer to any phone in the world; Create your own themes with HTML and cascading style sheets". -- COVER
Google hacking for penetration testers by Johnny Long( )

16 editions published between 2005 and 2008 in English and held by 1,498 WorldCat member libraries worldwide

"A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information."--Author
InfoSec career hacking : sell your skillz, not your soul by Aaron W Bayles( )

7 editions published between 2005 and 2014 in English and held by 1,494 WorldCat member libraries worldwide

"InfoSec Career Hacking" starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world. The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities. It teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies. It provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career
Penetration tester's open source toolkit. by Deviant Ollam( )

19 editions published between 2005 and 2012 in English and held by 1,491 WorldCat member libraries worldwide

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools
No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing by Johnny Long( )

14 editions published between 2007 and 2011 in English and Spanish and held by 558 WorldCat member libraries worldwide

"As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks."--Publisher description
How to own an identity by Ryan Russell( )

2 editions published in 2005 in English and held by 391 WorldCat member libraries worldwide

The first two books in this series "Stealing the Network: How to Own the Box” and "Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... ""Stealing the Network: How to Own an Identity"" is the 3rd book in the ""Stealing""
Stealing the network : the complete series collector's edition by Ryan Russell( )

17 editions published between 2008 and 2009 in English and held by 258 WorldCat member libraries worldwide

Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one.- from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder Director, Black Hat, Inc. and Founder of DEFCONFor the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.This book contains all of the material from each of the four books in the Stealing the Network series.All of the stories and tech from:How to Own the BoxHow to Own a ContinentHow to Own an IdentityHow to Own a ShadowPlus:Finally - find out how the story ends! The final chapter is here!A DVD full of behind the scenes stories and insider info about the making of these cult classics! * Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of Knuth in the much anticipated Final Chapter
Google Hacking for Penetration Testers by Johnny Long( )

2 editions published between 2005 and 2015 in English and held by 21 WorldCat member libraries worldwide

Google Hacking for Penetration Testers by Johnny Long( )

in English and held by 20 WorldCat member libraries worldwide

L'hacker della porta accanto by Johnny Long( Book )

5 editions published between 2008 and 2012 in Italian and English and held by 11 WorldCat member libraries worldwide

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology. - Dumpster Diving Be a good sport and don't read the two?D{u0094} words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). - Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. - Shoulder Surfing If you like having a screen on your laptop so you can see what you're working on, don't read this chapter. - Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? - Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. - Google Hacking A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful. - P2P Hacking Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. - People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye. - Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? - Vehicle Surveillance Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!
Google Hacking for Penetration Testers, Volume 2 by Johnny Long( )

2 editions published between 2007 and 2008 in English and held by 10 WorldCat member libraries worldwide

A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are truecreative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information. Johnny Long Learn Google Searching Basics Explore Googles Web-based Interface, build Google queries, and work with Google URLs. Use Advanced Operators to Perform Advanced Queries Combine advanced operators and learn about colliding operators and bad search-fu. Learn the Ways of the Google Hacker See how to use caches for anonymity and review directory listings and traversal techniques. Review Document Grinding and Database Digging See the ways to use Google to locate documents and then search within the documents to locate information. Understand Googles Part in an Information Collection Framework Learn the principles of automating searches and the applications of data mining. Locate Exploits and Finding Targets Locate exploit code and then vulnerable targets. See Ten Simple Security Searches Learn a few searches that give good results just about every time and are good for a security assessment. Track Down Web Servers Locate and profile web servers, login portals, network hardware and utilities. See How Bad Guys Troll for Data Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information. Hack Google Services Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more
Google talking by Brian Baskin( )

1 edition published in 2007 in English and held by 4 WorldCat member libraries worldwide

Google hacking for penetration testers by Johnny Long( )

in English and held by 4 WorldCat member libraries worldwide

Aggressive network self-defense by Neil R Wyler( )

1 edition published in 2005 in English and held by 4 WorldCat member libraries worldwide

Annotation
The big band sound. over 70 minutes of music( Recording )

1 edition published in 1991 in English and held by 3 WorldCat member libraries worldwide

Fei ji shu gong ji : Cai niao ye neng fang hei ke = No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing by Johnny Long( Book )

1 edition published in 2009 in Chinese and held by 2 WorldCat member libraries worldwide

Penetration tester's open ource toolkit( Book )

1 edition published in 2006 in English and held by 1 WorldCat member library worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.11 (from 0.01 for Penetratio ... to 0.94 for Google Hac ...)

How to own an identity
Covers
Stealing the network : how to own a shadow: the chase for KnuthStealing the network : how to own an identityGoogle talkingGoogle hacking for penetration testersInfoSec career hacking : sell your skillz, not your soulPenetration tester's open source toolkit.No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfingHow to own an identity
Alternative Names
Johnny Long American computer security expert

롱, 조니

Languages
English (196)

French (4)

Spanish (4)

Chinese (3)

Italian (3)

German (2)

Czech (1)