Gray Hat Hacking the Ethical Hackers Handbook, 3rd Edition by Gideon Lenkey, Shon Harris, Allen Harper, Jonathan Ness and Chris Eagle (2011, Trade Paperback)

Brenham Book Company (679)
93.2% positive Feedback
Price:
US $82.78
Approximately£62.00
+ $71.33 postage
Estimated delivery Fri, 8 Aug - Fri, 22 Aug
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount. Policy depends on postage service.
Condition:
New
Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

About this product

Product Identifiers

PublisherMcGraw-Hill Osborne
ISBN-100071742557
ISBN-139780071742559
eBay Product ID (ePID)102825226

Product Key Features

Number of Pages720 Pages
LanguageEnglish
Publication NameGray Hat Hacking the Ethical Hackers Handbook, 3rd Edition
SubjectSoftware Development & Engineering / General, Networking / General, Security / General
Publication Year2011
TypeTextbook
Subject AreaComputers
AuthorGideon Lenkey, Shon Harris, Allen Harper, Jonathan Ness, Chris Eagle
FormatTrade Paperback

Dimensions

Item Height1.5 in
Item Weight40.2 Oz
Item Length9.4 in
Item Width7.2 in

Additional Product Features

Edition Number3
Intended AudienceScholarly & Professional
LCCN2010-053295
Dewey Edition22
IllustratedYes
Dewey Decimal005.8
Table Of ContentPart I: Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II: Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Distribution Chapter 8 Using Metasploit Chapter 9 Managing a Penetration Test Part III: Exploiting Chapter 10 Programming Survival Skills Chapter 11 Basic Linux Exploits Chapter 12 Advanced Linux Exploits Chapter 13 Shellcode Strategies Chapter 14 Writing Linux Shellcode Chapter 15 Windows Exploits Chapter 16 Understanding and Detecting Content-Type Attacks Chapter 17 Web Application Security Vulnerabilities Chapter 18 VoIP Attacks Chapter 19 SCADA Attacks Part IV: Vulnerability Analysis Chapter 20 Passive Analysis Chapter 21 Advanced Static Analysis with IDA Pro Chapter 22 Advanced Reverse Engineering Chapter 23 Client-Side Browser Exploits Chapter 24 Exploiting the Windows Access Control Model Chapter 25 Intelligent Fuzzing with Sulley Chapter 26 From Vulnerability to Exploit Chapter 27 Closing the Holes: Mitigation Part V: Malware Analysis Chapter 28 Collecting Malware and Initial Analysis Chapter 29 Hacking Malware Index
SynopsisTHE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes, Fully expanded to cover the latest devious hacking methods, the third edition of this bestselling ethical hacking and security testing book provides in-depth, advanced coverage of vulnerability discovery and reverse engineering.
LC Classification NumberQA76.9.A25

All listings for this product

Buy it now
Any condition
New
Pre-owned

Ratings and reviews

4.0
2 product ratings
  • 1 users rated this 5 out of 5 stars
  • 0 users rated this 4 out of 5 stars
  • 1 users rated this 3 out of 5 stars
  • 0 users rated this 2 out of 5 stars
  • 0 users rated this 1 out of 5 stars

Would recommend

Good value

Compelling content

Most relevant reviews

  • Grey Hat Hacking

    I have not finished reading this book yet, but it is very informative but it is a little advanced. If you are just learning, you may want to consider buying something a little less advanced. I purchased it with Hacking for Dummies. That seems like a good combination. He does spend a lot of time trying to convince the reader that he did not write this book to teach "black hat hackers" and the penalties if you get caught doing something illegal.

    Verified purchase: YesCondition: Pre-owned

  • Very Hard to understand

    I read the reviews and more people say it's easy to understand and a few that says it's not So I went with the ones that was the most saying easy and no learning before hand and when I get it it's very hard so it is no use to me sinceI don't understand it.

    Verified purchase: YesCondition: Pre-owned