Import It All
Books > Computers & Technology > Networking & Cloud Computing > Network Security
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

Product ID: 69577923 Condition: New

Payflex: Pay in 4 interest-free payments of R566.50. Learn more
R 2,266
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow

Product Description

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

<p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span style="white-space:pre"></span>authenticity, or access to any online entitlements included with the product.</b></p><p><b><br></b></p><p><b>Cutting-edge techniques for finding and fixing critical security flaws</b></p><p>Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, <i>Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition</i> explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.</p><p>•<span style="white-space:pre"></span>Build and launch spoofing exploits with Ettercap</p><p>•<span style="white-space:pre"></span>Induce error conditions and crash software using fuzzers</p><p>•<span style="white-space:pre"></span>Use advanced reverse engineering to exploit Windows and Linux software</p><p>•<span style="white-space:pre"></span>Bypass Windows Access Control and memory protection schemes</p><p>•<span style="white-space:pre"></span>Exploit web applications with Padding Oracle Attacks</p><p>•<span style="white-space:pre"></span>Learn the use-after-free technique used in recent zero days</p><p>•<span style="white-space:pre"></span>Hijack web browsers with advanced XSS attacks</p><p>•<span style="white-space:pre"></span>Understand ransomware and how it takes control of your desktop</p><p>•<span style="white-space:pre"></span>Dissect Android malware with JEB and DAD decompilers</p><p>•<span style="white-space:pre"></span>Find one-day vulnerabilities with binary diffing</p><p>•<span style="white-space:pre"></span>Exploit wireless systems with Software Defined Radios (SDR)</p><p>•<span style="white-space:pre"></span>Exploit Internet of things devices</p><p>•<span style="white-space:pre"></span>Dissect and exploit embedded devices</p><p>•<span style="white-space:pre"></span>Understand bug bounty programs</p><p>•<span style="white-space:pre"></span>Deploy next-generation honeypots</p><p>•<span style="white-space:pre"></span>Dissect ATM malware and analyze common ATM attacks</p><p>•<span style="white-space:pre"></span>Learn the business side of ethical hacking</p><p><br></p>

Technical Specifications

Country
USA
Brand
McGraw-Hill Education
Manufacturer
McGraw Hill
Binding
Paperback
ItemPartNumber
29172815
UnitCount
1
EANs
9781260108415

You might also like

Back to top