enki Library
 
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Description
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. *Build and launch spoofing exploits with Ettercap and Evilgrade *Induce error conditions and crash software using fuzzers *Hack Cisco routers, switches, and network hardware *Use advanced reverse engineering to exploit Windows and Linux software *Bypass Windows Access Control and memory protection schemes *Scan for flaws in Web applications using Fiddler and the x5 plugin *Learn the use-after-free technique used in recent zero days *Bypass Web authentication via MySQL type conversion and MD5 injection attacks *Inject your shellcode into a browser's memory using the latest Heap Spray techniques *Hijack Web browsers with Metasploit and the BeEF Injection Framework *Neutralize ransomware before it takes control of your desktop *Dissect Android malware with JEB and DAD decompilers *Find one-day vulnerabilities with binary diffing. --Provided by publisher.
  • Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. *Build and launch spoofing exploits with Ettercap and Evilgrade *Induce error conditions and crash software using fuzzers *Hack Cisco routers, switches, and network hardware *Use advanced reverse engineering to exploit Windows and Linux software *Bypass Windows Access Control and memory protection schemes *Scan for flaws in Web applications using Fiddler and the x5 plugin *Learn the use-after-free technique used in recent zero days *Bypass Web authentication via MySQL type conversion and MD5 injection attacks *Inject your shellcode into a browser's memory using the latest Heap Spray techniques *Hijack Web browsers with Metasploit and the BeEF Injection Framework *Neutralize ransomware before it takes control of your desktop *Dissect Android malware with JEB and DAD decompilers *Find one-day vulnerabilities with binary diffing. --Provided by publisher.
APA Citation (style guide)

Regalado, D., Harper, A., & Harris, S. (2015). Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education.

Chicago / Turabian - Author Date Citation (style guide)

Regalado, Daniel, Allen, Harper and Shon, Harris. 2015. Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education.

Chicago / Turabian - Humanities Citation (style guide)

Regalado, Daniel, Allen, Harper and Shon, Harris, Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education, 2015.

MLA Citation (style guide)

Regalado, Daniel., Allen Harper, and Shon Harris. Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. McGraw-Hill Education, 2015.

Citation formats are based on standards as of July 2010. Citations contain only title, author, edition, publisher, and year published.
Citations should be used as a guideline and should be double checked for accuracy.
Loading...
LEADER02868nam a2200361Ia 4500
001  1000306206
003ENKI
007cr un ---uuuuu
008151119s2015    xx      o     00    eng d
020 |a 9780071838504 |c $120
0241 |a 
035 |a 1000306206
041 |a eng
1001 |a Regalado, Daniel.
2101 |a Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
24510 |a Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition |h [electronic resource] / |c Daniel Regalado.
260 |a [S.l.] : |b McGraw-Hill Education, |c 2015.
300 |a 1 online resource (656 p.)
337 |a EPUB
520 |a Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. *Build and launch spoofing exploits with Ettercap and Evilgrade *Induce error conditions and crash software using fuzzers *Hack Cisco routers, switches, and network hardware *Use advanced reverse engineering to exploit Windows and Linux software *Bypass Windows Access Control and memory protection schemes *Scan for flaws in Web applications using Fiddler and the x5 plugin *Learn the use-after-free technique used in recent zero days *Bypass Web authentication via MySQL type conversion and MD5 injection attacks *Inject your shellcode into a browser's memory using the latest Heap Spray techniques *Hijack Web browsers with Metasploit and the BeEF Injection Framework *Neutralize ransomware before it takes control of your desktop *Dissect Android malware with JEB and DAD decompilers *Find one-day vulnerabilities with binary diffing. --Provided by publisher.
562 |e 1
592 |a 9780071838504.jpg
650 0 |a Computer viruses.
650 0 |a Computers.
650 0 |a Data encryption (Computer science)
650 7 |a COMPUTERS / Reference |2 bisacsh.
650 7 |a COMPUTERS / Security / Cryptography |2 bisacsh.
650 7 |a COMPUTERS / Security / Viruses & Malware |2 bisacsh.
655 7 |a Electronic books. |2 lcsh
7001 |a Harper, Allen, |e author.
7001 |a Harris, Shon, |e author.
77608 |i Print version: |a Regalado, Daniel. |t Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition. |z 9780071832380
998 |b 111915_mcgraw