[(Gray Hat Hacking the Ethical Hacker's Handbook)] [By (author) Daniel Regalado ] published on (February, 2015) par Daniel Regalado

December 10, 2019

[(Gray Hat Hacking the Ethical Hacker's Handbook)] [By (author) Daniel Regalado ] published on (February, 2015) par Daniel Regalado

Titre de livre: [(Gray Hat Hacking the Ethical Hacker's Handbook)] [By (author) Daniel Regalado ] published on (February, 2015)

Auteur: Daniel Regalado

Date de sortie: February 1, 2015

Éditeur: McGraw-Hill Education - Europe

Téléchargez ou lisez le livre [(Gray Hat Hacking the Ethical Hacker's Handbook)] [By (author) Daniel Regalado ] published on (February, 2015) de Daniel Regalado au format PDF et EPUB. Ici, vous pouvez télécharger gratuitement tous les livres au format PDF ou Epub. Utilisez le bouton disponible sur cette page pour télécharger ou lire un livre en ligne.

The latest strategies for vulnerability discovery and exploitation, mobile security, malware analysis, and reverse engineering Fully updated throughout and featuring 13 entirely new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition reveals how to thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Hacking-related law and ethics are discussed in detail. You'll learn how to defend against the latest vulnerabilities in browsers, mobile devices, routers, web apps, and Linux and Windows operating systems. The book explains how to automate Metasploit to speed up the penetration testing process and how to dissect malicious Android apps, rootkits, 64-bit binaries, and botnets. Features 13 all-new chapters New topics covered include intelligent fuzzing, spoofing-based attacks, exploiting Cisco routers, mobile devices and web apps, advanced client-side exploitation, Android malware dissection, and kernel-mode rootkit dissection Explains the most advanced hacking techniques such as fuzzing, Java and Adobe Sandbox bypassing, IE use-after-free exploitation, and DEP/ASLR/SEHOP bypassing Covers emerging trends in malware such as Stuxnet, Android, Botnets, and 64-bit malicious binaries Based on courses taught by the authors and professional experience gained through real-world engagements