Book Description
This book is mainly useful for security researchers an ethical hackers. Everyone knows about search engine and no one knows about the process behind it. This book explains about all the process behind search engine. So this book can be used by all kind of people. This book also explains to decrypt the Google user input and how to modify this decrypted input. It can be used as an advanced foot printing tool. The accurate output needed by the search engine user can be obtained after learning this book. The working method of Google in all over countries are also explained. Hacking live camera in bank, schools, colleges are also listed. All the working methods are explained with neat screen shots and so it is easy to understand. If anyone has an interest with search engine you can surely buy this book and make use of it.