
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Security | >> | Gray Hat Hacking: Th... |
ISBN
:
9780070248649
Publisher
:
Tata Mgraw Hill
Subject
:
Computer Security, Computer Programming / Software Development, Computer Science
Binding
:
Paperback
Year
:
2008
₹
595.0
₹
434.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
This fully updated volume offers a comprehensive overview of today's hacking and computer security landscape. Learn the latest techniques to uncover, legally disclose, and fix vulnerabilities deep within software and networks. The book includes six brand-new chapters and fully updated material throughout. It is the only ethical hacking book on the market to provide in-depth coverage of vulnerability discovery and reverse engineering. It also offers full details on cutting-edge attack methods, hacking-related law, malware analysis, and post-exploitation survival.
Author Biography
Shon Harris MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant. Allen Harper CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina. Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California. Jonathan Ness CHFI, is a lead software security engineer at Microsoft. Table of Contents Part I: Introduction to Ethical Disclosure Chapter 1. Ethics of Ethical Hacking Chapter 2. Ethical Hacking and the Legal System Chapter 3. Proper and Ethical Disclosure Part II: Penetration Testing and Tools Chapter 4. Using Metasploit Chapter 5. Using the BackTrack LiveCD Linux Distribution Part III: Exploits 101 Chapter 6. Programming Survival Skills Chapter 7. Basic Linux Exploits Chapter 8. Advanced Linux Exploits Chapter 9. Shellcode Strategies Chapter 10. Writing Linux Shellcode Chapter 11. Basic Windows Exploits Part IV: Vulnerability Analysis Chapter 12. Passive Analysis Chapter 13. Advanced Static Analysis with IDA Pro Chapter 14. Advanced Reverse Engineering Chapter 15. Client-SideBrowser Exploits Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege Chapter 17. Intelligent Fuzzing with Sulley Chapter 18. From Vulnerability to Exploit Chapter 19. Closing the Holes: Mitigation Part V: Malware Analysis Chapter 20. Collecting Malware and Initial Analysis Chapter 21. Hacking Malware Index
Related Items
-
of
Designing Concurrent, Distributed, and Real-Time Applications with UML
Hassan Gomaa
Starts At
6079.0
7999.0
24% OFF
Theoretical Aspects of Object-Oriented Programming: Types, Semantics, and Language Design (Foundations of Computing)
Carl A. Gunter
Starts At
12973.0
15085.0
14% OFF
Neural Networks and Artificial Intelligence for Biomedical Engineering
Donna L. Hudson
Starts At
15918.0
18510.0
14% OFF
Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition
Douglas R. Hofstadter
Starts At
813.0
1099.0
26% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary