{
  "kind": "books#volumes",
  "totalItems": 1000000,
  "items": [
    {
      "kind": "books#volume",
      "id": "bvB1-MmhEjQC",
      "etag": "R6RtqalN+LM",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/bvB1-MmhEjQC",
      "volumeInfo": {
        "title": "Google Hacking for Penetration Testers",
        "authors": [
          "Bill Gardner",
          "Johnny Long",
          "Justin Brown"
        ],
        "publisher": "Elsevier",
        "publishedDate": "2011-04-18",
        "description": "This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and \"self-police their own organizations.Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can \"mash up\" Google with MySpace, LinkedIn, and more for passive reconaissance.• Learn Google Searching BasicsExplore Google's Web-based Interface, build Google queries, and work with Google URLs.• Use Advanced Operators to Perform Advanced QueriesCombine advanced operators and learn about colliding operators and bad search-fu.• Learn the Ways of the Google HackerSee how to use caches for anonymity and review directory listings and traversal techniques.• Review Document Grinding and Database DiggingSee the ways to use Google to locate documents and then search within the documents to locate information. • Understand Google's Part in an Information Collection FrameworkLearn the principles of automating searches and the applications of data mining.• Locate Exploits and Finding TargetsLocate exploit code and then vulnerable targets.• See Ten Simple Security SearchesLearn a few searches that give good results just about every time and are good for a security assessment.• Track Down Web ServersLocate and profile web servers, login portals, network hardware and utilities.• See How Bad Guys Troll for DataFind ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.• Hack Google ServicesLearn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.",
        "industryIdentifiers": [
          {
            "type": "ISBN_13",
            "identifier": "9780080484266"
          },
          {
            "type": "ISBN_10",
            "identifier": "0080484263"
          }
        ],
        "readingModes": {
          "text": true,
          "image": true
        },
        "pageCount": 561,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "averageRating": 3.5,
        "ratingsCount": 10,
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": true,
        "contentVersion": "1.9.6.0.preview.3",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=bvB1-MmhEjQC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=bvB1-MmhEjQC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=bvB1-MmhEjQC&pg=PA335&dq=intitle:&hl=&cd=1&source=gbs_api",
        "infoLink": "https://play.google.com/store/books/details?id=bvB1-MmhEjQC&source=gbs_api",
        "canonicalVolumeLink": "https://play.google.com/store/books/details?id=bvB1-MmhEjQC"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "FOR_SALE_AND_RENTAL",
        "isEbook": true,
        "listPrice": {
          "amount": 5810,
          "currencyCode": "JPY"
        },
        "retailPrice": {
          "amount": 5229,
          "currencyCode": "JPY"
        },
        "buyLink": "https://play.google.com/store/books/details?id=bvB1-MmhEjQC&rdid=book-bvB1-MmhEjQC&rdot=1&source=gbs_api",
        "offers": [
          {
            "finskyOfferType": 1,
            "listPrice": {
              "amountInMicros": 5810000000,
              "currencyCode": "JPY"
            },
            "retailPrice": {
              "amountInMicros": 5229000000,
              "currencyCode": "JPY"
            }
          },
          {
            "finskyOfferType": 3,
            "listPrice": {
              "amountInMicros": 2034000000,
              "currencyCode": "JPY"
            },
            "retailPrice": {
              "amountInMicros": 2034000000,
              "currencyCode": "JPY"
            },
            "rentalDuration": {
              "unit": "DAY",
              "count": 90
            }
          }
        ]
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "PARTIAL",
        "embeddable": true,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": true,
          "acsTokenLink": "http://books.google.co.jp/books/download/Google_Hacking_for_Penetration_Testers-sample-epub.acsm?id=bvB1-MmhEjQC&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
        },
        "pdf": {
          "isAvailable": true,
          "acsTokenLink": "http://books.google.co.jp/books/download/Google_Hacking_for_Penetration_Testers-sample-pdf.acsm?id=bvB1-MmhEjQC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
        },
        "webReaderLink": "http://play.google.com/books/reader?id=bvB1-MmhEjQC&hl=&source=gbs_api",
        "accessViewStatus": "SAMPLE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e : &quot; Network Print Server &quot; intext : &quot; http://www.axis.com &quot; filetype : shtm \u003cb\u003eintitle\u003c/b\u003e : &quot; Browser Launch Page &quot; allinurl : index.htm ? cus ? audio \u003cb\u003eintitle\u003c/b\u003e : &quot; EverFocus.EDSR.applet &quot; \u003cb\u003eintitle\u003c/b\u003e : &quot; EpsonNet WebAssist Rev &quot; \u003cb\u003eintitle\u003c/b\u003e&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "XKgRELiphAcC",
      "etag": "VlHu5SrcYus",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/XKgRELiphAcC",
      "volumeInfo": {
        "title": "Google Hacking for Penetration Testers",
        "authors": [
          "Johnny Long"
        ],
        "publisher": "Elsevier",
        "publishedDate": "2004-12-17",
        "description": "Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as \"Google Hacking.\" When the modern security landscape includes such heady topics as \"blind SQL injection\" and \"integer overflows,\" it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious \"Google hackers,\" this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about \"Google Hacking\" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.",
        "industryIdentifiers": [
          {
            "type": "ISBN_13",
            "identifier": "9780080478050"
          },
          {
            "type": "ISBN_10",
            "identifier": "0080478050"
          }
        ],
        "readingModes": {
          "text": false,
          "image": true
        },
        "pageCount": 529,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "averageRating": 4,
        "ratingsCount": 11,
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": true,
        "contentVersion": "1.6.1.0.preview.1",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=XKgRELiphAcC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=XKgRELiphAcC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=XKgRELiphAcC&pg=PA107&dq=intitle:&hl=&cd=2&source=gbs_api",
        "infoLink": "https://play.google.com/store/books/details?id=XKgRELiphAcC&source=gbs_api",
        "canonicalVolumeLink": "https://play.google.com/store/books/details?id=XKgRELiphAcC"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "FOR_SALE",
        "isEbook": true,
        "listPrice": {
          "amount": 5720,
          "currencyCode": "JPY"
        },
        "retailPrice": {
          "amount": 5148,
          "currencyCode": "JPY"
        },
        "buyLink": "https://play.google.com/store/books/details?id=XKgRELiphAcC&rdid=book-XKgRELiphAcC&rdot=1&source=gbs_api",
        "offers": [
          {
            "finskyOfferType": 1,
            "listPrice": {
              "amountInMicros": 5720000000,
              "currencyCode": "JPY"
            },
            "retailPrice": {
              "amountInMicros": 5148000000,
              "currencyCode": "JPY"
            }
          }
        ]
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "PARTIAL",
        "embeddable": true,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": true,
          "acsTokenLink": "http://books.google.co.jp/books/download/Google_Hacking_for_Penetration_Testers-sample-pdf.acsm?id=XKgRELiphAcC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
        },
        "webReaderLink": "http://play.google.com/books/reader?id=XKgRELiphAcC&hl=&source=gbs_api",
        "accessViewStatus": "SAMPLE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e:index.of “Apache/2.0.51 server at” \u003cb\u003eintitle\u003c/b\u003e:index.of “Apache/2.0.52 server at” \u003cb\u003eintitle\u003c/b\u003e:index.of In addition to identifying the Web server version, it is also possible to deter- mine the operating system of the server (as well&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "-GdeAwAAQBAJ",
      "etag": "RmlyITWNVGU",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/-GdeAwAAQBAJ",
      "volumeInfo": {
        "title": "Guerrilla Marketing for Job Hunters 3.0",
        "subtitle": "How to Stand Out from the Crowd and Tap Into the Hidden Job Market using Social Media and 999 other Tactics Today",
        "authors": [
          "Jay Conrad Levinson",
          "David E. Perry"
        ],
        "publisher": "John Wiley & Sons",
        "publishedDate": "2011-05-03",
        "description": "The latest strategies for job hunters revealed in this revised and updated edition This new Third Edition features the latest job-hunting strategies for the Information Age. You'll discover key techniques to reach hiring managers at the employers you want to work for most. New chapters integrate using social media and social networking tools like Facebook, Twitter, LinkedIn, and ZoomInfo in your job search, along with case studies from successful guerrilla job hunters that detail what works in today's hyper competitive job market with commentary from America's top recruiters. Present your skills in creative new ways that stand out in today's hyper-competitive job market Employ little-known search engine optimization tricks used by top headhunters Integrated web site updated bi-weekly to remain state-of-the-moment Part of the Guerrilla Marketing Series, the bestselling marketing book series The job search process has changed drastically in the past few years. Turn these changes to your advantage and make your search successful with Guerilla Marketing for Job Hunters 3.0.",
        "industryIdentifiers": [
          {
            "type": "ISBN_13",
            "identifier": "9781118019092"
          },
          {
            "type": "ISBN_10",
            "identifier": "1118019091"
          }
        ],
        "readingModes": {
          "text": false,
          "image": true
        },
        "pageCount": 374,
        "printType": "BOOK",
        "categories": [
          "Business & Economics"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "1.2.2.0.preview.1",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=-GdeAwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=-GdeAwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=-GdeAwAAQBAJ&pg=PA172&dq=intitle:&hl=&cd=3&source=gbs_api",
        "infoLink": "http://books.google.co.jp/books?id=-GdeAwAAQBAJ&dq=intitle:&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Guerrilla_Marketing_for_Job_Hunters_3_0.html?hl=&id=-GdeAwAAQBAJ"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "PARTIAL",
        "embeddable": true,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": true,
          "acsTokenLink": "http://books.google.co.jp/books/download/Guerrilla_Marketing_for_Job_Hunters_3_0-sample-pdf.acsm?id=-GdeAwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api"
        },
        "webReaderLink": "http://play.google.com/books/reader?id=-GdeAwAAQBAJ&hl=&source=gbs_api",
        "accessViewStatus": "SAMPLE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e : profile -\u003cb\u003eintitle\u003c/b\u003e : updated -\u003cb\u003eintitle\u003c/b\u003e : blog -\u003cb\u003eintitle\u003c/b\u003e : directory -\u003cb\u003eintitle\u003c/b\u003e : jobs -\u003cb\u003eintitle\u003c/b\u003e : groups -\u003cb\u003eintitle\u003c/b\u003e : events -\u003cb\u003eintitle\u003c/b\u003e : answers With this search string we get 160 people . If we want to find all names at Georgia&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "IPp07U0OktkC",
      "etag": "pOxZ17uMY7M",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/IPp07U0OktkC",
      "volumeInfo": {
        "title": "Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions",
        "authors": [
          "David Endler",
          "Mark Collier"
        ],
        "publisher": "McGraw Hill Professional",
        "publishedDate": "2006-11-28",
        "description": "Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way \"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies.\" --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams",
        "industryIdentifiers": [
          {
            "type": "ISBN_13",
            "identifier": "9780072263640"
          },
          {
            "type": "ISBN_10",
            "identifier": "0072263644"
          }
        ],
        "readingModes": {
          "text": false,
          "image": false
        },
        "pageCount": 576,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "averageRating": 4.5,
        "ratingsCount": 7,
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.3.4.0.preview.0",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=IPp07U0OktkC&printsec=frontcover&img=1&zoom=5&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=IPp07U0OktkC&printsec=frontcover&img=1&zoom=1&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=IPp07U0OktkC&q=intitle:&dq=intitle:&hl=&cd=4&source=gbs_api",
        "infoLink": "http://books.google.co.jp/books?id=IPp07U0OktkC&dq=intitle:&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Hacking_Exposed_VoIP_Voice_Over_IP_Secur.html?hl=&id=IPp07U0OktkC"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "NO_PAGES",
        "embeddable": false,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED_FOR_ACCESSIBILITY",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": true
        },
        "webReaderLink": "http://play.google.com/books/reader?id=IPp07U0OktkC&hl=&source=gbs_api",
        "accessViewStatus": "NONE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e:&quot;Sipura SPA Configuration&quot; \u003cb\u003eintitle\u003c/b\u003e:&quot;Grandstream Device Configuration&quot; password inurl:&quot;coreConf.htm&quot; \u003cb\u003eintitle\u003c/b\u003e:&quot;SoundPoint IP Configuration Utility&quot; \u003cb\u003eintitle\u003c/b\u003e:&quot;VoIP Phone Web Configuration Pages&quot; &quot;(e.g. 0114930398330)&quot; snom. 21. 22&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "HdBQAAAAMAAJ",
      "etag": "sdwZ7ipA2B4",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/HdBQAAAAMAAJ",
      "volumeInfo": {
        "title": "Hacking Exposed 5th Edition",
        "authors": [
          "Stuart McClure",
          "Joel Scambray",
          "George Kurtz"
        ],
        "publisher": "McGraw-Hill/Osborne Media",
        "publishedDate": "2005-04-19",
        "description": "“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine \"The definitive compendium of intruder practices and tools.\" --Steve Steinke, Network Magazine \"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in.\" --UNIX Review Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes: Code hacking methods and countermeasures New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications Latest DDoS techniques--zombies, Blaster, MyDoom All new class of vulnerabilities--HTTP Response Splitting and much more",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "UOM:39015060895805"
          }
        ],
        "readingModes": {
          "text": false,
          "image": false
        },
        "pageCount": 728,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.12.4.0.preview.0",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=HdBQAAAAMAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=HdBQAAAAMAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=HdBQAAAAMAAJ&q=intitle:&dq=intitle:&hl=&cd=5&source=gbs_api",
        "infoLink": "http://books.google.co.jp/books?id=HdBQAAAAMAAJ&dq=intitle:&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Hacking_Exposed_5th_Edition.html?hl=&id=HdBQAAAAMAAJ"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "NO_PAGES",
        "embeddable": false,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=HdBQAAAAMAAJ&hl=&source=gbs_api",
        "accessViewStatus": "NONE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e : &quot; Ganglia &quot; &quot; Cluster Report for &quot; \u003cb\u003eintitle\u003c/b\u003e : &quot; Index of &quot; dbconvert . chats \u003cb\u003eintitle\u003c/b\u003e : &quot; Apache HTTP Server &quot; \u003cb\u003eintitle\u003c/b\u003e : &quot; documentation &quot; &quot; Error Diagnostic Information &quot; \u003cb\u003eintitle\u003c/b\u003e : &quot; Error Occurred While &quot; \u003cb\u003eintitle\u003c/b\u003e : &quot; Index of&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "QNebPh9MYqcC",
      "etag": "KTL83lJw6B4",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/QNebPh9MYqcC",
      "volumeInfo": {
        "title": "A New English Dictionary on Historical Principles",
        "subtitle": "Founded Mainly on the Materials Collected by the Philological Society",
        "authors": [
          "James Augustus Henry Murray",
          "Sir William Alexander Craigie",
          "Charles Talbut Onions"
        ],
        "publishedDate": "1897",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "EHC:148100220911T"
          }
        ],
        "readingModes": {
          "text": false,
          "image": true
        },
        "pageCount": 1254,
        "printType": "BOOK",
        "categories": [
          "English language"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.2.3.0.full.1",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=QNebPh9MYqcC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=QNebPh9MYqcC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=QNebPh9MYqcC&pg=RA1-PA219&dq=intitle:&hl=&cd=6&source=gbs_api",
        "infoLink": "https://play.google.com/store/books/details?id=QNebPh9MYqcC&source=gbs_api",
        "canonicalVolumeLink": "https://play.google.com/store/books/details?id=QNebPh9MYqcC"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "FREE",
        "isEbook": true,
        "buyLink": "https://play.google.com/store/books/details?id=QNebPh9MYqcC&rdid=book-QNebPh9MYqcC&rdot=1&source=gbs_api"
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "ALL_PAGES",
        "embeddable": true,
        "publicDomain": true,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false,
          "downloadLink": "http://books.google.co.jp/books/download/A_New_English_Dictionary_on_Historical_P.epub?id=QNebPh9MYqcC&hl=&output=epub&source=gbs_api"
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=QNebPh9MYqcC&hl=&source=gbs_api",
        "accessViewStatus": "FULL_PUBLIC_DOMAIN",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e . See also INTITULE . [ a . AF . entitle - r , OF . entiteler , entituler , mod . Fr. intituler , corresp . to Pr . entitolar , intitular , It . intitolare , late L. intitulāre , f . in in + titulus TITLE . ] I. From TITLE&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "Y6OH0KpVOxwC",
      "etag": "W84sIUa9Pm0",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/Y6OH0KpVOxwC",
      "volumeInfo": {
        "title": "A New English Dictionary on Historical Principles",
        "publishedDate": "1891",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "BSB:BSB11460464"
          }
        ],
        "readingModes": {
          "text": false,
          "image": true
        },
        "pageCount": 512,
        "printType": "BOOK",
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.0.1.0.full.1",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=Y6OH0KpVOxwC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=Y6OH0KpVOxwC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=Y6OH0KpVOxwC&pg=PA219&dq=intitle:&hl=&cd=7&source=gbs_api",
        "infoLink": "https://play.google.com/store/books/details?id=Y6OH0KpVOxwC&source=gbs_api",
        "canonicalVolumeLink": "https://play.google.com/store/books/details?id=Y6OH0KpVOxwC"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "FREE",
        "isEbook": true,
        "buyLink": "https://play.google.com/store/books/details?id=Y6OH0KpVOxwC&rdid=book-Y6OH0KpVOxwC&rdot=1&source=gbs_api"
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "ALL_PAGES",
        "embeddable": true,
        "publicDomain": true,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false,
          "downloadLink": "http://books.google.co.jp/books/download/A_New_English_Dictionary_on_Historical_P.epub?id=Y6OH0KpVOxwC&hl=&output=epub&source=gbs_api"
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=Y6OH0KpVOxwC&hl=&source=gbs_api",
        "accessViewStatus": "FULL_PUBLIC_DOMAIN",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e . See also INTITULE . [ a . AF . entitle - r , OF . entiteler , entituler , mod . Fr. intituler , corresp . to Pr . entitolar , intitular , It . intitolare , late L. intitulāre , f . in in + titulus TITLE . ] I. From TITLE&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "nulSAAAAMAAJ",
      "etag": "2LwS+K9Tsoc",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/nulSAAAAMAAJ",
      "volumeInfo": {
        "title": "Counter Hack Reloaded",
        "subtitle": "A Step-by-step Guide to Computer Attacks and Effective Defenses",
        "authors": [
          "Ed Skoudis",
          "Tom Liston"
        ],
        "publisher": "Pearson",
        "publishedDate": "2006",
        "description": "This guide empowers network and system administrators to defend their information and computing assets--whether or not they have security experience. Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics, and specific, proven countermeasures for both UNIX and Windows environments.",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "UOM:39015062823060"
          }
        ],
        "readingModes": {
          "text": false,
          "image": false
        },
        "pageCount": 788,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "averageRating": 4.5,
        "ratingsCount": 4,
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.5.1.0.preview.0",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=nulSAAAAMAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=nulSAAAAMAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=nulSAAAAMAAJ&q=intitle:&dq=intitle:&hl=&cd=8&source=gbs_api",
        "infoLink": "http://books.google.co.jp/books?id=nulSAAAAMAAJ&dq=intitle:&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Counter_Hack_Reloaded.html?hl=&id=nulSAAAAMAAJ"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "NO_PAGES",
        "embeddable": false,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=nulSAAAAMAAJ&hl=&source=gbs_api",
        "accessViewStatus": "NONE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e : &quot; A Not Found Checking for : &quot; Error Di Google Hacking Database Use this for tested signatures and easy to ... \u003cb\u003eintitle\u003c/b\u003e &quot; Ganglia &quot; &quot; Cluster Report for &quot; \u003cb\u003eintitle\u003c/b\u003e : &quot; Index of &quot; dbconvert exe chats \u003cb\u003eintitle\u003c/b\u003e : &quot; Apache HTTP&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "_pdDAQAAMAAJ",
      "etag": "9VhysTdcRMA",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/_pdDAQAAMAAJ",
      "volumeInfo": {
        "title": "The English Reports: King's Bench Division",
        "publishedDate": "1907",
        "description": "V. 1-11. House of Lords (1677-1865) -- v. 12-20. Privy Council (including Indian Appeals) (1809-1865) -- v. 21-47. Chancery (including Collateral reports) (1557-1865) -- v. 48-55. Rolls Court (1829-1865) -- v. 56-71. Vice-Chancellors' Courts (1815-1865) -- v. 72-122. King's Bench (1378-1865) -- v. 123-144. Common Pleas (1486-1865) -- v. 145-160. Exchequer (1220-1865) -- v. 161-167. Ecclesiastical (1752-1857), Admiralty (1776-1840), and Probate and Divorce (1858-1865) -- v. 168-169. Crown Cases (1743-1865) -- v. 170-176. Nisi Prius (1688-1867).",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "CORNELL:31924064793957"
          }
        ],
        "readingModes": {
          "text": false,
          "image": true
        },
        "pageCount": 1032,
        "printType": "BOOK",
        "categories": [
          "Law reports, digests, etc"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.6.6.0.full.1",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=_pdDAQAAMAAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=_pdDAQAAMAAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=_pdDAQAAMAAJ&pg=PA200&dq=intitle:&hl=&cd=9&source=gbs_api",
        "infoLink": "https://play.google.com/store/books/details?id=_pdDAQAAMAAJ&source=gbs_api",
        "canonicalVolumeLink": "https://play.google.com/store/books/details?id=_pdDAQAAMAAJ"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "FREE",
        "isEbook": true,
        "buyLink": "https://play.google.com/store/books/details?id=_pdDAQAAMAAJ&rdid=book-_pdDAQAAMAAJ&rdot=1&source=gbs_api"
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "ALL_PAGES",
        "embeddable": true,
        "publicDomain": true,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false,
          "downloadLink": "http://books.google.co.jp/books/download/The_English_Reports_King_s_Bench_Divisio.epub?id=_pdDAQAAMAAJ&hl=&output=epub&source=gbs_api"
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=_pdDAQAAMAAJ&hl=&source=gbs_api",
        "accessViewStatus": "FULL_PUBLIC_DOMAIN",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e al terî q gist en demesne pun office , 9 Co. 95 , 96. cest office \u003cb\u003eintitle\u003c/b\u003e le Roy , maintenant a le possession , &amp; il ad possession main- tenant ipso facto , de [ 43 ] tiel alteration de possession chescun home ẽ lie de prender&nbsp;..."
      }
    },
    {
      "kind": "books#volume",
      "id": "Xa4aAQAAMAAJ",
      "etag": "bhooryiMwc8",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/Xa4aAQAAMAAJ",
      "volumeInfo": {
        "title": "The English Reports",
        "publishedDate": "1901",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "IND:30000029142431"
          }
        ],
        "readingModes": {
          "text": false,
          "image": true
        },
        "pageCount": 1420,
        "printType": "BOOK",
        "categories": [
          "Law reports, digests, etc"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "2.11.13.0.full.1",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=Xa4aAQAAMAAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=Xa4aAQAAMAAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.co.jp/books?id=Xa4aAQAAMAAJ&pg=PA320&dq=intitle:&hl=&cd=10&source=gbs_api",
        "infoLink": "https://play.google.com/store/books/details?id=Xa4aAQAAMAAJ&source=gbs_api",
        "canonicalVolumeLink": "https://play.google.com/store/books/details?id=Xa4aAQAAMAAJ"
      },
      "saleInfo": {
        "country": "JP",
        "saleability": "FREE",
        "isEbook": true,
        "buyLink": "https://play.google.com/store/books/details?id=Xa4aAQAAMAAJ&rdid=book-Xa4aAQAAMAAJ&rdot=1&source=gbs_api"
      },
      "accessInfo": {
        "country": "JP",
        "viewability": "ALL_PAGES",
        "embeddable": true,
        "publicDomain": true,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false,
          "downloadLink": "http://books.google.co.jp/books/download/The_English_Reports.epub?id=Xa4aAQAAMAAJ&hl=&output=epub&source=gbs_api"
        },
        "pdf": {
          "isAvailable": true,
          "downloadLink": "http://books.google.co.jp/books/download/The_English_Reports.pdf?id=Xa4aAQAAMAAJ&hl=&output=pdf&sig=ACfU3U04K3pE8tGDTjyg8ZididsqDlKNEg&source=gbs_api"
        },
        "webReaderLink": "http://play.google.com/books/reader?id=Xa4aAQAAMAAJ&hl=&source=gbs_api",
        "accessViewStatus": "FULL_PUBLIC_DOMAIN",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "... \u003cb\u003eintitle\u003c/b\u003e the appellants to read evidence of them on the hearing of the cause , yet , under the circumstances , and especially considering that the respondent had full notice of the settlement , and those proceedings , and had actually&nbsp;..."
      }
    }
  ]
}
