Gray Hat Hacking The Ethical Hacker's Handbook, 4/e (Paperback)
暫譯: 灰帽駭客:道德駭客手冊(第4版,平裝本)
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims
- 出版商: McGraw-Hill Education
- 出版日期: 2015-01-05
- 定價: $1,980
- 售價: 5.0 折 $990
- 語言: 英文
- 頁數: 656
- 裝訂: Paperback
- ISBN: 0071832386
- ISBN-13: 9780071832380
-
相關分類:
Penetration-test
-
相關翻譯:
灰帽駭客:正義駭客的道德規範、滲透測試、攻擊方法和漏洞分析技術, 4/e (Gray Hat Hacking: The Ethical Hacker's Handbook) (簡中版)
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
Postfix: The Definitive Guide (Paperback)$1,254$1,188 -
Activiti in Action: Executable business processes in BPMN 2.0 (Paperback)$1,760$1,672 -
無瑕的程式碼-敏捷軟體開發技巧守則 (Clean Code: A Handbook of Agile Software Craftsmanship)$580$452 -
超圖解 Arduino 互動設計入門, 2/e$680$578 -
JavaScript and JQuery: Interactive Front-End Web Development (Paperback)$1,640$1,558 -
改變世界的九大演算法 : 讓今日電腦無所不能的最強概念 (Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today’s Computers)$360$284 -
ASP.NET MVC 5 網站開發美學$780$616 -
網站滲透測試實務入門$380$300 -
啊哈!圖解演算法必學基礎$350$298 -
邁向 jQuery 達人的階梯$490$417 -
Mastering Bitcoin: Unlocking Digital Cryptocurrencies (Paperback)$1,330$1,264 -
養成 iOS 8 App 程式設計實力的 25 堂課-最新 Swift 開發教學(A Practical Guide to Building Your First App from Scratch: Beginning iOS 8 Programming with Swift)$580$452 -
Android 程式設計入門、應用到精通--增訂第三版 (適用 5.X~1.X, Android Wear 穿戴式裝置)$560$442 -
SDN: 軟體定義網路 (SDN: Software Defined Networks)$580$458 -
Docker 入門與實戰$450$356 -
Android Hacker's Handbook 駭客攻防聖經 (Android Hacker's Handbook)$690$538 -
精通 Python|運用簡單的套件進行現代運算 (Introducing Python: Modern Computing in Simple Packages)$780$616 -
黑帽 Python | 給駭客與滲透測試者的 Python 開發指南 (Black Hat Python: Python Programming for Hackers and Pentesters)$400$316 -
iOS 9 + Apple Watch 程式設計實戰-快速上手的開發技巧 200+$540$427 -
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance (Hardcover)$3,030$2,879 -
Python 程式設計實務-從初學到活用 Python 開發技巧的16堂課$560$437 -
Python 機器學習 (Python Machine Learning)$580$452 -
新觀念 Microsoft Visual C# 程式設計範例教本, 4/e$580$493 -
Python 自動化的樂趣|搞定重複瑣碎 & 單調無聊的工作 (中文版) (Automate the Boring Stuff with Python: Practical Programming for Total Beginners)$500$425 -
演算法技術手冊, 2/e (Algorithms in a Nutshell: A Practical Guide, 2/e)$580$458
相關主題
商品描述
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
- Build and launch spoofing exploits with Ettercap and Evilgrade
- Induce error conditions and crash software using fuzzers
- Hack Cisco routers, switches, and network hardware
- Use advanced reverse engineering to exploit Windows and Linux software
- Bypass Windows Access Control and memory protection schemes
- Scan for flaws in Web applications using Fiddler and the x5 plugin
- Learn the use-after-free technique used in recent zero days
- Bypass Web authentication via MySQL type conversion and MD5 injection attacks
- Inject your shellcode into a browser's memory using the latest Heap Spray techniques
- Hijack Web browsers with Metasploit and the BeEF Injection Framework
- Neutralize ransomware before it takes control of your desktop
- Dissect Android malware with JEB and DAD decompilers
- Find one-day vulnerabilities with binary diffing
商品描述(中文翻譯)
尋找和修復關鍵安全漏洞的尖端技術
透過安全專家的團隊提供的經驗策略,強化您的網路並避免數位災難。《Gray Hat Hacking: The Ethical Hacker's Handbook》第四版已全面更新,新增12個章節,解釋敵方目前的武器、技能和戰術,並提供經過實地測試的解決方案、案例研究和隨時可部署的測試實驗室。了解駭客如何獲取訪問權限、接管網路設備、編寫和注入惡意代碼,以及掠奪Web應用程式和瀏覽器。這本最先進的資源全面涵蓋基於Android的漏洞、逆向工程技術和網路法律。
- 使用Ettercap和Evilgrade構建和啟動欺騙性漏洞
- 使用模糊測試工具誘發錯誤條件並使軟體崩潰
- 駭入Cisco路由器、交換機和網路硬體
- 利用進階逆向工程技術攻擊Windows和Linux軟體
- 繞過Windows訪問控制和記憶體保護機制
- 使用Fiddler和x5插件掃描Web應用程式中的漏洞
- 學習最近零日漏洞中使用的使用後釋放技術
- 透過MySQL類型轉換和MD5注入攻擊繞過Web身份驗證
- 使用最新的Heap Spray技術將您的shellcode注入瀏覽器的記憶體
- 使用Metasploit和BeEF注入框架劫持Web瀏覽器
- 在勒索病毒控制您的桌面之前中和它
- 使用JEB和DAD反編譯器剖析Android惡意軟體
- 透過二進位差異分析找到一天漏洞
