Image from Google Jackets

Gray hat hacking : the ethical hacker's handbook / Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris.

By: Contributor(s): Copyright date: New York : McGraw-Hill Education, c2018Edition: Fifth editionDescription: xxxi, 602 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781260108415 (soft cover : alk. paper)
  • 1260108414 (soft cover : alk. paper)
Subject(s): DDC classification:
  • 005.8 .H293 2018
LOC classification:
  • QA76.9.A25 H375 2018
Summary: "Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. The new topic of exploiting the Internet of things is introduced in this edition." --Provided by publisher
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Print Materials Main Library Reference 005.8 .H293 2018 (Browse shelf(Opens below)) Available 0122473

Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper ... [et al.].

Includes bibliographical references and index.

"Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. The new topic of exploiting the Internet of things is introduced in this edition." --Provided by publisher

Adult 0.00

Text in English

There are no comments on this title.

to post a comment.