{
  "kind": "books#volumes",
  "totalItems": 2,
  "items": [
    {
      "kind": "books#volume",
      "id": "69NQAAAAMAAJ",
      "etag": "0a3GmqO/jTk",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/69NQAAAAMAAJ",
      "volumeInfo": {
        "title": "Hack Attacks Denied",
        "subtitle": "A Complete Guide to Network Lockdown",
        "authors": [
          "John Chirillo"
        ],
        "publishedDate": "2001-04-26",
        "description": "\"The CD-ROM provides detailed examples of making gateways and firewalls fortified against security breaches\".",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "UOM:39015051295775"
          }
        ],
        "readingModes": {
          "text": false,
          "image": false
        },
        "pageCount": 520,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.5.3.0.preview.0",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=69NQAAAAMAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=69NQAAAAMAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.com/books?id=69NQAAAAMAAJ&dq=isbn:0471416258&hl=&cd=1&source=gbs_api",
        "infoLink": "http://books.google.com/books?id=69NQAAAAMAAJ&dq=isbn:0471416258&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Hack_Attacks_Denied.html?hl=&id=69NQAAAAMAAJ"
      },
      "saleInfo": {
        "country": "US",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "US",
        "viewability": "NO_PAGES",
        "embeddable": false,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=69NQAAAAMAAJ&hl=&source=gbs_api",
        "accessViewStatus": "NONE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains: Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and ..."
      }
    },
    {
      "kind": "books#volume",
      "id": "NALWzAEACAAJ",
      "etag": "dlgY4EzS7LI",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/NALWzAEACAAJ",
      "volumeInfo": {
        "title": "Hack Attacks Denied",
        "subtitle": "A Complete Guide to Network Lockdown",
        "authors": [
          "John Chirillo"
        ],
        "publisher": "Wiley",
        "publishedDate": "2001-04-26",
        "description": "Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability for incoming attacks and a turnkey prevention system to keep them out. Network professionals will find expert guidance on securing ports and services, intrusion detection mechanisms, gateways and routers, Tiger Team secrets, Internet server daemons, operating systems, proxies and firewalls, and more.",
        "industryIdentifiers": [
          {
            "type": "ISBN_10",
            "identifier": "0471416258"
          },
          {
            "type": "ISBN_13",
            "identifier": "9780471416258"
          }
        ],
        "readingModes": {
          "text": false,
          "image": false
        },
        "pageCount": 512,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "preview-1.0.0",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "language": "en",
        "previewLink": "http://books.google.com/books?id=NALWzAEACAAJ&dq=isbn:0471416258&hl=&cd=2&source=gbs_api",
        "infoLink": "http://books.google.com/books?id=NALWzAEACAAJ&dq=isbn:0471416258&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Hack_Attacks_Denied.html?hl=&id=NALWzAEACAAJ"
      },
      "saleInfo": {
        "country": "US",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "US",
        "viewability": "NO_PAGES",
        "embeddable": false,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=NALWzAEACAAJ&hl=&source=gbs_api",
        "accessViewStatus": "NONE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains: Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and ..."
      }
    }
  ]
}
