Google Apps Hacks

Google Apps Hacks
Author: Philipp Lenssen
Publisher: "O'Reilly Media, Inc."
Total Pages: 379
Release: 2008
Genre: Computers
ISBN: 059651588X

Google is challenging the venerable Microsoft Office suite with its own Web-based office applications. This book offers scores of clever hacks and workarounds that enable power users to get more out of various applications.

Google Apps Hacks

Google Apps Hacks
Author: Philipp Lenssen
Publisher: "O'Reilly Media, Inc."
Total Pages: 379
Release: 2008
Genre: Computers
ISBN: 059651588X

Google is challenging the venerable Microsoft Office suite with its own Web-based office applications. This book offers scores of clever hacks and workarounds that enable power users to get more out of various applications.

Google Hacks

Google Hacks
Author: Rael Dornfest
Publisher: "O'Reilly Media, Inc."
Total Pages: 546
Release: 2006-08-03
Genre: Computers
ISBN: 0596553706

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information. Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more. The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it: Search Google over IM with a Google Talk bot Build a customized Google Map and add it to your own web site Cover your searching tracks and take back your browsing privacy Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice Keep tabs on blogs in new, useful ways Turn Gmail into an external hard drive for Windows, Mac, or Linux Beef up your web pages with search, ads, news feeds, and more Program Google with the Google API and language of your choice For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

Google Hacks

Google Hacks
Author: Tara Calishain
Publisher: "O'Reilly Media, Inc."
Total Pages: 356
Release: 2003
Genre: Computers
ISBN: 9780596004477

Explains how to take advantage of Google's user interface, discussing how to filter results, use Google's special services, integrate Google applications into a Web site or Weblog, write information retrieval programs, and play games.

Exposing Google Maps

Exposing Google Maps
Author: Bryan Seely
Publisher: Wiley
Total Pages: 0
Release: 2015-08-24
Genre: Computers
ISBN: 9781119048602

An insider account of the security holes that left Google Maps exposed Hacking and Exposing Google Mapsis the story of Bryan Seely, the well-known ethical hacker who discovered the vulnerabilities in Google Maps. Written by Bryan himself, this detailed story draws from his firsthand experience to define all the parties involved, outline the background information, lay out the timeline of events, and explain the technical solutions that sew up the holes in Google Maps. Engaging and revealing, this book provides expert insight into the vulnerabilities and hacks that could affect other map directories like Yelp, Bing, and Apple Maps. Bryan discusses his struggles in convincing the Secret Service, FBI, and Google of the threat, and divulges the shocking details of how criminals have forged a stronghold in Google Maps and other directories by means of mail fraud, wire fraud, and more. Google Maps for mobile is one of the most popular mobile apps, but security has become a growing concern, with the satellite imagery offering potential terrorists a valuable tool for choosing targets and planning attacks. This book describes the vulnerabilities that hackers exploit, from the man who was the first to discover them in the Google Maps directory. Understand Google Maps' critical vulnerabilities Discover who is taking advantage of the situation Learn how victims are fighting back Explore the technical fixes that lock it down tight Data security is increasingly on everyone's mind, and this book tells a riveting, real-life tale of what happens when it goes wrong on a massive scale. Hacking and Exposing Google Maps is a witty, absorbing, informative story and cautionary tale, with in-depth technical know-how for preventing future attacks.

The Mobile Application Hacker's Handbook

The Mobile Application Hacker's Handbook
Author: Dominic Chell
Publisher: John Wiley & Sons
Total Pages: 816
Release: 2015-02-24
Genre: Computers
ISBN: 1118958500

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers
Author: Bill Gardner
Publisher: Elsevier
Total Pages: 561
Release: 2011-04-18
Genre: Computers
ISBN: 0080484263

This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police their own organizations. Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance. • Learn Google Searching Basics Explore Google’s Web-based Interface, build Google queries, and work with Google URLs. • Use Advanced Operators to Perform Advanced Queries Combine advanced operators and learn about colliding operators and bad search-fu. • Learn the Ways of the Google Hacker See how to use caches for anonymity and review directory listings and traversal techniques. • Review Document Grinding and Database Digging See the ways to use Google to locate documents and then search within the documents to locate information. • Understand Google’s Part in an Information Collection Framework Learn the principles of automating searches and the applications of data mining. • Locate Exploits and Finding Targets Locate exploit code and then vulnerable targets. • See Ten Simple Security Searches Learn a few searches that give good results just about every time and are good for a security assessment. • Track Down Web Servers Locate and profile web servers, login portals, network hardware and utilities. • See How Bad Guys Troll for Data Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information. • Hack Google Services Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.