Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Description
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. *Build and launch spoofing exploits with Ettercap and Evilgrade *Induce error conditions and crash software using fuzzers *Hack Cisco routers, switches, and network hardware *Use advanced reverse engineering to exploit Windows and Linux software *Bypass Windows Access Control and memory protection schemes *Scan for flaws in Web applications using Fiddler and the x5 plugin *Learn the use-after-free technique used in recent zero days *Bypass Web authentication via MySQL type conversion and MD5 injection attacks *Inject your shellcode into a browser's memory using the latest Heap Spray techniques *Hijack Web browsers with Metasploit and the BeEF Injection Framework *Neutralize ransomware before it takes control of your desktop *Dissect Android malware with JEB and DAD decompilers *Find one-day vulnerabilities with binary diffing. --Provided by publisher.
- Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. *Build and launch spoofing exploits with Ettercap and Evilgrade *Induce error conditions and crash software using fuzzers *Hack Cisco routers, switches, and network hardware *Use advanced reverse engineering to exploit Windows and Linux software *Bypass Windows Access Control and memory protection schemes *Scan for flaws in Web applications using Fiddler and the x5 plugin *Learn the use-after-free technique used in recent zero days *Bypass Web authentication via MySQL type conversion and MD5 injection attacks *Inject your shellcode into a browser's memory using the latest Heap Spray techniques *Hijack Web browsers with Metasploit and the BeEF Injection Framework *Neutralize ransomware before it takes control of your desktop *Dissect Android malware with JEB and DAD decompilers *Find one-day vulnerabilities with binary diffing. --Provided by publisher.
APA Citation (style guide)
Regalado, D., Harper, A., & Harris, S. (2015). Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education.
Chicago / Turabian - Author Date Citation (style guide)Regalado, Daniel, Allen, Harper and Shon, Harris. 2015. Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education.
Chicago / Turabian - Humanities Citation (style guide)Regalado, Daniel, Allen, Harper and Shon, Harris, Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education, 2015.
MLA Citation (style guide)Regalado, Daniel., Allen Harper, and Shon Harris. Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education, 2015.
Citation formats are based on standards as of July 2010. Citations contain only title, author, edition, publisher, and year published.
Citations should be used as a guideline and should be double checked for accuracy.
Loading...
LEADER | 02868nam a2200361Ia 4500 | ||
---|---|---|---|
001 | 1000306206 | ||
003 | ENKI | ||
007 | cr un ---uuuuu | ||
008 | 151119s2015 xx o 00 eng d | ||
020 | |a 9780071838504 |c $120 | ||
024 | 1 | |a | |
035 | |a 1000306206 | ||
041 | |a eng | ||
100 | 1 | |a Regalado, Daniel. | |
210 | 1 | |a Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition | |
245 | 1 | 0 | |a Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition |h [electronic resource] / |c Daniel Regalado. |
260 | |a [S.l.] : |b McGraw-Hill Education, |c 2015. | ||
300 | |a 1 online resource (656 p.) | ||
337 | |a EPUB | ||
520 | |a Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. *Build and launch spoofing exploits with Ettercap and Evilgrade *Induce error conditions and crash software using fuzzers *Hack Cisco routers, switches, and network hardware *Use advanced reverse engineering to exploit Windows and Linux software *Bypass Windows Access Control and memory protection schemes *Scan for flaws in Web applications using Fiddler and the x5 plugin *Learn the use-after-free technique used in recent zero days *Bypass Web authentication via MySQL type conversion and MD5 injection attacks *Inject your shellcode into a browser's memory using the latest Heap Spray techniques *Hijack Web browsers with Metasploit and the BeEF Injection Framework *Neutralize ransomware before it takes control of your desktop *Dissect Android malware with JEB and DAD decompilers *Find one-day vulnerabilities with binary diffing. --Provided by publisher. | ||
562 | |e 1 | ||
592 | |a 9780071838504.jpg | ||
650 | 0 | |a Computer viruses. | |
650 | 0 | |a Computers. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh. | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh. | |
650 | 7 | |a COMPUTERS / Security / Viruses & Malware |2 bisacsh. | |
655 | 7 | |a Electronic books. |2 lcsh | |
700 | 1 | |a Harper, Allen, |e author. | |
700 | 1 | |a Harris, Shon, |e author. | |
776 | 0 | 8 | |i Print version: |a Regalado, Daniel. |t Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. |z 9780071832380 |
998 | |b 111915_mcgraw |