000 | 02045nam a2200229Ia 4500 | ||
---|---|---|---|
999 |
_c14751 _d14751 |
||
003 | VITAP | ||
005 | 20200310121449.0 | ||
008 | 170725s9999 xx 000 0 und d | ||
020 | _a9780071077316 | ||
040 | _cVITAP | ||
041 | _aEnglish | ||
082 |
_223rd _a005.8 HAR |
||
245 | 0 |
_aGray Hat Hacking : _bThe Ethical Hacker's Handbook _c/ Allen Harper...[et al.]. |
|
250 | _a3rd Ed. | ||
260 |
_bMcGraw-Hill Education (India) Pvt. Ltd. _aChennai _c2018 |
||
300 |
_bBook _axxiv, 693p. : ill. ; _c24cm |
||
500 | _aIt includes Index pages THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes | ||
650 | 0 |
_99314 _aHackers; Computer security |
|
700 |
_99315 _aHarper, Allen |
||
856 | _uhttps://www.mheducation.co.in/gray-hat-hacking-the-ethical-hackers-handbook-3rd-edition-9780071077316-india#tab-label-product-description-title | ||
942 |
_cBK _2ddc _h005.8 HAR |