0

My Bag

0.00

Download App

Gray Hat Hacking: The Ethical Hackers Handbook 18.0%OFF

Gray Hat Hacking: The Ethical Hackers Handbook

by Shon Harris

  • ISBN

    :  

    9780071077316

  • Publisher

    :  

    Tata Mcgraw Hill Education Private Limited

  • Subject

    :  

    Computer Security, Computer Programming / Software Development, Computer Science

  • Binding

    :  

    Paperback

  • Year

    :  

    2011

1150.0

18.0% OFF

943.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes

  • Author Biography

    Allen Harper CISSP, a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC. Shon Harris CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and a bestselling author. She was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. Table of Contents Part I Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Distribution Chapter 8 Using Metasploit Chapter 9 Managing a Penetration Test Part III Exploiting Chapter 10 Programming Survival Skills Chapter 11 Basic Linux Exploits Chapter 12 Advanced Linux Exploits Chapter 13 Shellcode Strategies Chapter 14 Writing Linux Shellcode Chapter 15 Windows Exploits Chapter 16 Understanding and Detecting Content-Type Attacks Chapter 17 Web Application Security Vulnerabilities Chapter 18 VoIP Attacks Chapter 19 SCADA Attacks Part IV Vulnerability Analysis Chapter 20 Passive Analysis Chapter 21 Advanced Static Analysis with IDA Pro Chapter 22 Advanced Reverse Engineering Chapter 23 Client-Side Browser Exploits Chapter 24 Exploiting the Windows Access Control Model Chapter 25 Intelligent Fuzzing with Sulley Chapter 26 From Vulnerability to Exploit Chapter 27 Closing the Holes: Mitigation Part V Malware Analysis Chapter 28 Collecting Malware and Initial Analysis Chapter 29 Hacking Malware Index

Related Items

-

of

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • OFFER

    Visual C++ Programming

    Yashavant P. Kanetkar

    Starts At

    288.0

    390.0

    26% OFF

  • Integrated Telecommunications Management Solutions

    Graham Chen

    Starts At

    11558.0

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    SOFTWARE DESIGN, 2/ED

    Budgen

    Starts At

    222.0

    285.0

    22% OFF

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    An Introduction to Distributed Algorithms

    Valmir C. Barbosa

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    An Introduction to Neural Networks

    James A. Anderson

    Starts At

    8427.0

    11089.0

    24% OFF

  • OFFER

    Theoretical Aspects of Object-Oriented Programming: Types, Semantics, and Language Design (Foundations of Computing)

    Carl A. Gunter

    Starts At

    12973.0

    15085.0

    14% OFF

  • OFFER

    FreeBSD:the Complete Refrence

    Smith

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 2 Items

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary