0

My Bag

0.00

Download App

Gray Hat Hacking: The Ethical Hacker's Handbook 27.0%OFF

Gray Hat Hacking: The Ethical Hacker's Handbook

by Shon Harris

  • ISBN

    :  

    9780070248649

  • Publisher

    :  

    Tata Mgraw Hill

  • Subject

    :  

    Computer Security, Computer Programming / Software Development, Computer Science

  • Binding

    :  

    Paperback

  • Year

    :  

    2008

595.0

27.0% OFF

434.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    This fully updated volume offers a comprehensive overview of today's hacking and computer security landscape. Learn the latest techniques to uncover, legally disclose, and fix vulnerabilities deep within software and networks. The book includes six brand-new chapters and fully updated material throughout. It is the only ethical hacking book on the market to provide in-depth coverage of vulnerability discovery and reverse engineering. It also offers full details on cutting-edge attack methods, hacking-related law, malware analysis, and post-exploitation survival.

  • Author Biography

    Shon Harris MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant. Allen Harper CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina. Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California. Jonathan Ness CHFI, is a lead software security engineer at Microsoft. Table of Contents Part I: Introduction to Ethical Disclosure Chapter 1. Ethics of Ethical Hacking Chapter 2. Ethical Hacking and the Legal System Chapter 3. Proper and Ethical Disclosure Part II: Penetration Testing and Tools Chapter 4. Using Metasploit Chapter 5. Using the BackTrack LiveCD Linux Distribution Part III: Exploits 101 Chapter 6. Programming Survival Skills Chapter 7. Basic Linux Exploits Chapter 8. Advanced Linux Exploits Chapter 9. Shellcode Strategies Chapter 10. Writing Linux Shellcode Chapter 11. Basic Windows Exploits Part IV: Vulnerability Analysis Chapter 12. Passive Analysis Chapter 13. Advanced Static Analysis with IDA Pro Chapter 14. Advanced Reverse Engineering Chapter 15. Client-SideBrowser Exploits Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege Chapter 17. Intelligent Fuzzing with Sulley Chapter 18. From Vulnerability to Exploit Chapter 19. Closing the Holes: Mitigation Part V: Malware Analysis Chapter 20. Collecting Malware and Initial Analysis Chapter 21. Hacking Malware Index

Related Items

-

of

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • OFFER

    Visual C++ Programming

    Yashavant P. Kanetkar

    Starts At

    288.0

    390.0

    26% OFF

  • Integrated Telecommunications Management Solutions

    Graham Chen

    Starts At

    11558.0

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    SOFTWARE DESIGN, 2/ED

    Budgen

    Starts At

    222.0

    285.0

    22% OFF

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    An Introduction to Distributed Algorithms

    Valmir C. Barbosa

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    An Introduction to Neural Networks

    James A. Anderson

    Starts At

    8427.0

    11089.0

    24% OFF

  • OFFER

    Theoretical Aspects of Object-Oriented Programming: Types, Semantics, and Language Design (Foundations of Computing)

    Carl A. Gunter

    Starts At

    12973.0

    15085.0

    14% OFF

  • OFFER

    FreeBSD:the Complete Refrence

    Smith

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 1 Item

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary