FREE SHIPPING BOTH WAYS
ON EVERY ORDER!
LIST PRICE:
$60.00

Sorry, this item is currently unavailable.

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

ISBN: 9780071742559 | 0071742557
Edition: 3rd
Format: Paperback
Publisher: McGraw-Hill Osborne Media
Pub. Date: 1/27/2011

Why Rent from Knetbooks?

Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way!

Top 5 reasons to order all your textbooks from Knetbooks:

  • We have the lowest prices on thousands of popular textbooks
  • Free shipping both ways on ALL orders
  • Most orders ship within 48 hours
  • Need your book longer than expected? Extending your rental is simple
  • Our customer support team is always here to help

The Latest Strategies For Uncovering Today's Most Devastating Attacks

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

-Develop and launch exploits using BackTrack and Metasploit

-Employ physical, social engineering, and insider attack techniques

-Build Perl, Python, and Ruby scripts that initiate stack buffer overflows

-Understand and prevent malicious content in Adobe, Office, and multimedia files

-Detect and block client-side, Web server, VoIP, and SCADA attacks

-Reverse engineer, fuzz, and decompile Windows and Linux software

-Develop SQL injection, cross-site scripting, and forgery exploits

-Trap malware and rootkits using honeypots and SandBoxes

Related Products


  • Gray Hat Hacking : The Ethical Hacker's Handbook
    Gray Hat Hacking : The Ethical...
  • Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
    Gray Hat Hacking The Ethical H...
  • Gray Hat Hacking, Second Edition
    Gray Hat Hacking, Second Edition


Please wait while this item is added to your cart...