Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.
·Build and launch spoofing exploits with Ettercap
·Induce error conditions and crash software using fuzzers
·Use advanced reverse engineering to exploit Windows and Linux software
·Bypass Windows Access Control and memory protection schemes
·Exploit web applications with Padding Oracle Attacks
·Learn the use-after-free technique used in recent zero days
·Hijack web browsers with advanced XSS attacks
·Understand ransomware and how it takes control of your desktop
·Dissect Android malware with JEB and DAD decompilers
·Find one-day vulnerabilities with binary diffing
·Exploit wireless systems with Software Defined Radios (SDR)
·Exploit Internet of things devices
·Dissect and exploit embedded devices
·Understand bug bounty programs
·Deploy next-generation honeypots
·Dissect ATM malware and analyze common ATM attacks
·Learn the business side of ethical hacking
Branko Spasojevic is a senior software engineer at Symantec.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Versand:
Gratis
Innerhalb der USA
Versand:
EUR 3,82
Innerhalb der USA
Anbieter: Dream Books Co., Denver, CO, USA
Zustand: acceptable. Heavily loved still intact and perfectly readable . Cosmetic wear only. Former Library book. Ships fast!. Bestandsnummer des Verkäufers DBV.1260108414.A
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
Paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!. Bestandsnummer des Verkäufers S_401172168
Anzahl: 1 verfügbar
Anbieter: SecondSale, Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00060479806
Anzahl: 2 verfügbar
Anbieter: SecondSale, Montgomery, IL, USA
Zustand: Acceptable. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00068168693
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Bestandsnummer des Verkäufers GOR010235390
Anzahl: 10 verfügbar
Anbieter: Book Deals, Tucson, AZ, USA
Zustand: Good. Good condition. This is the average used book, that has all pages or leaves present, but may include writing. Book may be ex-library with stamps and stickers. 2.07. Bestandsnummer des Verkäufers 353-1260108414-gdd
Anzahl: 1 verfügbar
Anbieter: Ergodebooks, Houston, TX, USA
Softcover. Zustand: Good. 5. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hackers Handbook, Fifth Edition explains the enemys current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.Build and launch spoofing exploits with EttercapInduce error conditions and crash software using fuzzersUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesExploit web applications with Padding Oracle AttacksLearn the use-after-free technique used in recent zero daysHijack web browsers with advanced XSS attacksUnderstand ransomware and how it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffingExploit wireless systems with Software Defined Radios (SDR)Exploit Internet of things devicesDissect and exploit embedded devicesUnderstand bug bounty programsDeploy next-generation honeypotsDissect ATM malware and analyze common ATM attacksLearn the business side of ethical hacking. Bestandsnummer des Verkäufers SONG1260108414
Anzahl: 1 verfügbar
Anbieter: Byrd Books, Austin, TX, USA
Paperback. Zustand: very good. In Used Condition. Bestandsnummer des Verkäufers Ubyused1260108414
Anzahl: 1 verfügbar
Anbieter: Books of the Smoky Mountains, Del Rio, TN, USA
Zustand: very good. Gently used book with ongoing seller support until you're fully satisfied with your purchase. Bestandsnummer des Verkäufers oldport1260108414
Anzahl: 1 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Paperback. Zustand: very good. Very Good Copy. Customer Service Guaranteed. Bestandsnummer des Verkäufers think_very_1260108414
Anzahl: 1 verfügbar