Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionMcGraw Hill Professional, 05.02.2011 - 720 Seiten THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
|
Inhalt
Introduction to Ethical Disclosure | 1 |
Penetration Testing and Tools | 75 |
Exploiting | 171 |
Urheberrecht | |
3 weitere Abschnitte werden nicht angezeigt.
Andere Ausgaben - Alle anzeigen
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition Allen Harper,Shon Harris,Jonathan Ness,Chris Eagle,Gideon Lenkey,Terron Williams Keine Leseprobe verfügbar - 2011 |
Häufige Begriffe und Wortgruppen
activities allow analysis application attack attempt binary block buffer build bytes cause chapter char command common compiled connection contains cover crash create debugger developed discussed engineering environment example execute exploit Figure format function fuzzing granted important input install instruction Internet loaded look machine malware memory method Microsoft object Once operating option password patch perform pointer port possible privilege problem protection protocol push References request result saved script server shell shellcode shown shows simple specific stack stored string structure things tion understand variable vendor vulnerability Windows write