Amazon cover image
Image from Amazon.com
Image from Google Jackets

Gray Hat Hacking : The Ethical Hacker's Handbook / Allen Harper...[et al.].

Contributor(s): Material type: TextTextLanguage: English Publication details: McGraw-Hill Education (India) Pvt. Ltd. Chennai 2018Edition: 3rd EdDescription: Book xxiv, 693p. : ill. ; 24cmISBN:
  • 9780071077316
Subject(s): DDC classification:
  • 23rd 005.8 HAR
Online resources:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Date due Barcode
Reference Book VIT-AP General Stacks Reference 005.8 HAR (Browse shelf(Opens below)) Not For Loan CSE 013116
Text Book VIT-AP General Stacks 005.8 HAR (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2025-04-19 CSE 00374
Text Book VIT-AP General Stacks 005.8 HAR (Browse shelf(Opens below)) Checked out to PENDELA.HARSHITH (21BCE7409) CSE 2023-03-27 00375

It includes Index pages

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

Develop and launch exploits using BackTrack and Metasploit
Employ physical, social engineering, and insider attack techniques
Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
Understand and prevent malicious content in Adobe, Office, and multimedia files
Detect and block client-side, Web server, VoIP, and SCADA attacks
Reverse engineer, fuzz, and decompile Windows and Linux software
Develop SQL injection, cross-site scripting, and forgery exploits
Trap malware and rootkits using honeypots and SandBoxes

There are no comments on this title.

to post a comment.

Visitor Number:

Powered by Koha