Gray Hat Hacking: The Ethical Hacker's Handbook
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
- 出版商: McGraw-Hill Education
- 出版日期: 2004-11-09
- 售價: $1,880
- 貴賓價: 9.5 折 $1,786
- 語言: 英文
- 頁數: 434
- 裝訂: Paperback
- ISBN: 0072257091
- ISBN-13: 9780072257090
-
相關分類:
駭客 Hack
已過版
買這商品的人也買了...
-
$980$774 -
$1,045Computing Concepts With Java Essentials, 3/e
-
$480$379 -
$590$466 -
$680$537 -
$560$504 -
$580$458 -
$2,330$2,214 -
$850$723 -
$480$379 -
$750$593 -
$490$382 -
$890$703 -
$299LPIC 1 Exam Cram 2: Linux Professional Institute Certification Exams 101 and 102 (Paperback)
-
$2,330$2,214 -
$650$553 -
$480$408 -
$650$507 -
$680$612 -
$520$406 -
$680$578 -
$620$527 -
$860$679 -
$390$332 -
$650$507
商品描述
Description:
Analyze your company’s vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker’s Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position.
Table of Contents:
Part I: Introduction to Ethical Disclosure
Chapter 1: Ethics of Ethical Hacking
Chapter 2: Ethical Hacking and the Legal System
Chapter 3: Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
Chapter 4: Pen-Testing Process
Chapter 5: Beyond Hacking Exposed: Advanced Tools for Today’s Hacker
Chapter 6: Automated Penetration Testing
Part III: Exploits
Chapter 7: Programming Survival Skills
Chapter 8: Basic Linux Exploits
Chapter 9: Advance Linux Exploits
Chapter 10: Writing Linux Shellcode
Chapter 11: Writing a Basic Windows Exploit
Part IV: Vulnerability Analysis
Chapter 12: Passive Analysis
Chapter 13: Advanced Reverse Engineering
Chapter 14: From Vulnerability to Exploit
Chapter 15: Closing the Holes: Mitigation