Gray Hat Hacking, Second Edition

Author:   Shon Harris ,  Allen Harper ,  Chris Eagle ,  Jonathan Ness
Publisher:   McGraw-Hill Education - Europe
Edition:   2nd edition
ISBN:  

9780071495684


Pages:   550
Publication Date:   16 February 2008
Replaced By:   9780071742559
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $131.97 Quantity:  
Add to Cart

Share |

Gray Hat Hacking, Second Edition


Add your own review!

Overview

""A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in."" --Bruce Potter, Founder, The Shmoo Group ""Very highly recommended whether you are a seasoned professional or just starting out in the security business."" --Simple Nomad, Hacker

Full Product Details

Author:   Shon Harris ,  Allen Harper ,  Chris Eagle ,  Jonathan Ness
Publisher:   McGraw-Hill Education - Europe
Imprint:   McGraw-Hill Professional
Edition:   2nd edition
Dimensions:   Width: 18.80cm , Height: 2.60cm , Length: 23.40cm
Weight:   0.934kg
ISBN:  

9780071495684


ISBN 10:   0071495681
Pages:   550
Publication Date:   16 February 2008
Audience:   Professional and scholarly ,  Professional & Vocational
Replaced By:   9780071742559
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Part I: Introduction to Ethical Disclosure Chapter 1. Ethics of Ethical Hacking Chapter 2. Ethical Hacking and the Legal System Chapter 3. Proper and Ethical Disclosure Part II: Penetration Testing and Tools Chapter 4. Using Metasploit Chapter 5. Using the BackTrack LiveCD Linux Distribution Part III: Exploits 101 Chapter 6. Programming Survival Skills Chapter 7. Basic Linux Exploits Chapter 8. Advanced Linux Exploits Chapter 9. Shellcode Strategies Chapter 10. Writing Linux Shellcode Chapter 11. Basic Windows Exploits Part IV: Vulnerability Analysis Chapter 12. Passive Analysis Chapter 13. Advanced Static Analysis with IDA Pro Chapter 14. Advanced Reverse Engineering Chapter 15. Client-Side Browser Exploits Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege Chapter 17. Intelligent Fuzzing with Sulley Chapter 18. From Vulnerability to Exploit Chapter 19. Closing the Holes: Mitigation Part V: Malware Analysis Chapter 20. Collecting Malware and Initial Analysis Chapter 21. Hacking Malware Index

Reviews

Author Information

Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List