• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

    Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition by Regalado, Daniel; Harris, Shon; Harper, Allen;

    Sorozatcím: NETWORKING & COMM - OMG;

      • 10% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 47.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        22 927 Ft (21 835 Ft + 5% áfa)
      • Kedvezmény(ek) 10% (cc. 2 293 Ft off)
      • Kedvezményes ár 20 634 Ft (19 652 Ft + 5% áfa)

    22 927 Ft

    Beszerezhetőség

    Bizonytalan a beszerezhetőség. Érdemes még egyszer keresni szerzővel és címmel. Ha nem talál másik, kapható kiadást, forduljon ügyfélszolgálatunkhoz!

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadás sorszáma 4
    • Kiadó McGraw-Hill Education
    • Megjelenés dátuma 2014. december 16.

    • ISBN 9780071832380
    • Kötéstípus Puhakötés
    • Terjedelem656 oldal
    • Méret 228x185x33 mm
    • Súly 941 g
    • Nyelv angol
    • 0

    Kategóriák

    Rövid leírás:

    Fully updated throughout and featuring 13 entirely new chapters, the new edition of this bestseller offers in-depth, advanced coverage of the latest strategies for vulnerability discovery and exploitation, mobile security, malware analysis, and reverse engineering

    Több

    Hosszú leírás:

    Cutting-edge techniques for finding and fixing critical security flaws

    Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy?s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

    • Build and launch spoofing exploits with Ettercap and Evilgrade
    • Induce error conditions and crash software using fuzzers
    • Hack Cisco routers, switches, and network hardware
    • Use advanced reverse engineering to exploit Windows and Linux software
    • Bypass Windows Access Control and memory protection schemes
    • Scan for flaws in Web applications using Fiddler and the x5 plugin
    • Learn the use-after-free technique used in recent zero days
    • Bypass Web authentication via MySQL type conversion and MD5 injection attacks
    • Inject your shellcode into a browser's memory using the latest Heap Spray techniques
    • Hijack Web browsers with Metasploit and the BeEF Injection Framework
    • Neutralize ransomware before it takes control of your desktop
    • Dissect Android malware with JEB and DAD decompilers
    • Find one-day vulnerabilities with binary diffing



    Cutting-edge techniques for finding and fixing critical security flaws

    Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy?s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

    • Build and launch spoofing exploits with Ettercap and Evilgrade
    • Induce error conditions and crash software using fuzzers
    • Hack Cisco routers, switches, and network hardware
    • Use advanced reverse engineering to exploit Windows and Linux software
    • Bypass Windows Access Control and memory protection schemes
    • Scan for flaws in Web applications using Fiddler and the x5 plugin
    • Learn the use-after-free technique used in recent zero days
    • Bypass Web authentication via MySQL type conversion and MD5 injection attacks
    • Inject your shellcode into a browser's memory using the latest Heap Spray techniques
    • Hijack Web browsers with Metasploit and the BeEF Injection Framework
    • Neutralize ransomware before it takes control of your desktop
    • Dissect Android malware with JEB and DAD decompilers
    • Find one-day vulnerabilities with binary diffing

    Több

    Tartalomjegyzék:

    Part I:Law & Ethics1: Ethical Hacking and the Legal SystemPart II: Crash Course: Preparing for the War2 Programming Survival Skill3 Passive Analysis4 Advanced Reverse Engineering with IDA Pro 5 Intelligent Fuzzing 6 Shellcode Strategies7 Writing Linux ShellcodePart III: From Vulnerability to Exploit8: Spoofing Based Attacks9: Exploiting Cisco Routers 10: Basic Linux Exports 11: Advanced Linux Exploits 12: Bypassing Windows Memory Protections 13: Exploiting the Windows Access Control Model 14: Exploiting Web Applications 15: Bypassing Adobe Sandbox 16: Client-Side Browser Exploits17: Exploiting Mobile Devices Part IV: Automated Exploitation18: Advanced Client-side Exploitation with BeEF19: Metasploit to the Next Level20: Commercial Exploit Frameworks AnalysisPart V: Advanced Malware Analysis21: Dissecting Stuxnet22: Dissecting Android Malware23: Dissecting Blackhole Exploit Kit24: Analyzing 64-bit Malware25: Dissecting Kernel-mode Rootkit

    Több
    0