Gray Hat Hacking The Ethical Hacker's Handbook, 4/e (Paperback)
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims
- 出版商: McGraw-Hill Education
- 出版日期: 2015-01-05
- 定價: $1,980
- 售價: 5.0 折 $990
- 語言: 英文
- 頁數: 656
- 裝訂: Paperback
- ISBN: 0071832386
- ISBN-13: 9780071832380
-
相關分類:
駭客 Hack
-
相關翻譯:
灰帽駭客:正義駭客的道德規範、滲透測試、攻擊方法和漏洞分析技術, 4/e (Gray Hat Hacking: The Ethical Hacker's Handbook) (簡中版)
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$1,056Postfix: The Definitive Guide (Paperback)
-
$1,960$1,862 -
$580$452 -
$680$578 -
$1,500$1,425 -
$360$284 -
$780$663 -
$380$323 -
$350$277 -
$490$417 -
$1,300$1,235 -
$580$452 -
$560$476 -
$580$458 -
$450$383 -
$690$538 -
$780$616 -
$400$340 -
$540$459 -
$3,030$2,879 -
$560$437 -
$580$452 -
$580$493 -
$500$395 -
$580$458
商品描述
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
- Build and launch spoofing exploits with Ettercap and Evilgrade
- Induce error conditions and crash software using fuzzers
- Hack Cisco routers, switches, and network hardware
- Use advanced reverse engineering to exploit Windows and Linux software
- Bypass Windows Access Control and memory protection schemes
- Scan for flaws in Web applications using Fiddler and the x5 plugin
- Learn the use-after-free technique used in recent zero days
- Bypass Web authentication via MySQL type conversion and MD5 injection attacks
- Inject your shellcode into a browser's memory using the latest Heap Spray techniques
- Hijack Web browsers with Metasploit and the BeEF Injection Framework
- Neutralize ransomware before it takes control of your desktop
- Dissect Android malware with JEB and DAD decompilers
- Find one-day vulnerabilities with binary diffing