|
||||
In this step-by-step demonstration, SearchSecurity.com contributor Tom Bowers demonstrates how some basic "Google hacking" methods can offer fascinating competitive intelligence for your enterprise.
|
|
Tom Bowers, managing director of security think tank and industry analyst firm Security Constructs, holds the CISSP, PMP and Certified Ethical Hacker certifications, and is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers serves as the president of the 600-member Philadelphia chapter of Infragard, is a technical editor of Information Security magazine, and speaks regularly at events like Information Security Decisions.
Learn more about Google hacking:
- Q&A: The trouble with Google hacking
- Chapter excerpt: Wallace Wang on how to prevent Google hacking
- Tip: Advanced operators to protect against Google hacking
This was first published in August 2007
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation