|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn192020173 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
080214s2008 nyua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d IDEBK
|d OCLCQ
|d TEFOD
|d CDX
|d CDN
|d COCUF
|d B24X7
|d CNCGM
|d UMI
|d CEF
|d DEBSZ
|d OCLCQ
|d OCLCF
|d P4I
|d OCLCA
|d OCL
|d OCLCQ
|d E7B
|d MEAUC
|d TEFOD
|d OCLCQ
|d PIFSG
|d X#7
|d OCLCQ
|d WY@
|d OCLCA
|d WCO
|d XQH
|d OCLCQ
|d TOH
|d VT2
|d C6I
|d OCLCQ
|d D6H
|d LIV
|d EBLCP
|d A7U
|d OCLCQ
|d UKAHL
|d AJS
|d OCLCQ
|d OCLCO
|d ANO
|d OCLCQ
|
019 |
|
|
|a 228414171
|a 233792374
|a 264537568
|a 503442119
|a 648336447
|a 656452036
|a 688507124
|a 958558584
|a 1084376951
|a 1129358904
|a 1152999731
|a 1192330005
|a 1262687924
|
020 |
|
|
|a 9780071595537
|q (electronic bk.)
|
020 |
|
|
|a 0071595538
|q (electronic bk.)
|
020 |
|
|
|a 0071495681
|q (alk. paper)
|
020 |
|
|
|a 9780071495684
|q (alk. paper)
|
029 |
1 |
|
|a AU@
|b 000053251408
|
029 |
1 |
|
|a CDX
|b 7447662
|
029 |
1 |
|
|a DEBSZ
|b 355393581
|
029 |
1 |
|
|a HEBIS
|b 291466990
|
029 |
1 |
|
|a NZ1
|b 13334916
|
035 |
|
|
|a (OCoLC)192020173
|z (OCoLC)228414171
|z (OCoLC)233792374
|z (OCoLC)264537568
|z (OCoLC)503442119
|z (OCoLC)648336447
|z (OCoLC)656452036
|z (OCoLC)688507124
|z (OCoLC)958558584
|z (OCoLC)1084376951
|z (OCoLC)1129358904
|z (OCoLC)1152999731
|z (OCoLC)1192330005
|z (OCoLC)1262687924
|
037 |
|
|
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a BE0E4D1F-AE34-4EB8-B3EA-DAF97CA3E54A
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b G743 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Gray hat hacking :
|b the ethical hacker's handbook /
|c Shon Harris [and others].
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a New York :
|b McGraw-Hill,
|c ©2008.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from PDF title page (viewed February 14, 2008).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Introduction to Ethical Disclosure -- Chapter 1 Ethics of Ethical Hacking -- How Does This Stuff Relate to an Ethical Hacking Book? -- Security Does Not Like Complexity -- Chapter 2 Ethical Hacking and the Legal System -- Addressing Individual Laws -- Chapter 3 Proper and Ethical Disclosure -- You Were Vulnerable for How Long? -- Different Teams and Points of View -- CERT's Current Process -- Full Disclosure Policy (RainForest Puppy Policy) -- Organization for Internet Safety (OIS) -- Conflicts Will Still Exist -- Case Studies -- Zero Day Initiative -- So What Should We Do from Here on Out? -- Part II: Penetration Testing and Tools -- Chapter 4 Using Metasploit -- Metasploit: The Big Picture -- Getting Metasploit -- Exploiting Client-Side Vulnerabilities with Metasploit -- Using Metasploit as a Man-in-the-Middle Password Stealer -- Using Metasploit to Auto-Attack -- Inside Metasploit Modules -- Chapter 5 Using the BackTrack LiveCD Linux Distribution -- BackTrack: The Big Picture -- Creating the BackTrack CD -- Booting BackTrack -- Exploring the BackTrack X-Windows Environment -- Writing BackTrack to Your USB Memory Stick -- Saving Your BackTrack Configurations -- Creating a Directory-Based or File-Based Module with dir2lzm -- Creating a New Base Module with All the Desired Directory Contents -- Cheat Codes and Selectively Loading Modules -- Metasploit db_autopwn -- Tools -- Part III: Exploits 101 -- Chapter 6 Programming Survival Skills -- C Programming Language -- Computer Memory -- Intel Processors -- Assembly Language Basics -- Debugging with gdb -- Python Survival Skills -- Chapter 7 Basic Linux Exploits -- Stack Operations -- Buffer Overflows -- Local Buffer Overflow Exploits -- Exploit Development Process -- Chapter 8 Advanced Linux Exploits -- Format String Exploits -- Heap Overflow Exploits -- Memory Protection Schemes -- Chapter 9 Shellcode Strategies -- User Space Shellcode -- Other Shellcode Considerations -- Kernel Space Shellcode -- Chapter 10 Writing Linux Shellcode -- Basic Linux Shellcode -- Implementing Port-Binding Shellcode -- Implementing Reverse Connecting Shellcode -- Encoding Shellcode -- Automating Shellcode Generation with Metasploit -- Chapter 11 Basic Windows Exploits -- Compiling and Debugging Windows Programs -- Windows Exploits -- Part IV: Vulnerability Analysis -- Chapter 12 Passive Analysis -- Ethical Reverse Engineering -- Why Reverse Engineering? -- Source Code Analysis -- Binary Analysis -- Chapter 13 Advanced Static Analysis with IDA Pro -- Static Analysis Challenges -- Extending IDA -- Chapter 14 Advanced Reverse Engineering -- Why Try to Break Software? -- The Software Development Process -- Instrumentation Tools -- Fuzzing -- Instrumented Fuzzing Tools and Techniques -- Chapter 15 Client-Side Browser Exploits -- Why Client-Side Vulnerabilities Are Interesting -- Internet Explorer Security Concepts -- History of Client-Side Exploits and Latest Trends -- Finding New Browser-Based Vulnerabilities -- Heap Spray to Exploit -- Protecting Yourself from Client-Side Exp.
|
520 |
|
|
|a A thorough revision of the bestselling guide to the tools and tricks of the hybrid hacker. Written by seasoned security authors and instructors, this fully updated volume offers a comprehensive overview of today's hacking and computer security landscape.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computer security.
|2 sears
|
650 |
|
7 |
|a Computer hackers.
|2 sears
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
700 |
1 |
|
|a Harris, Shon.
|
776 |
0 |
8 |
|i Print version:
|z 9780071495684
|w (DLC) 2007047838
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071495684/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26367809
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00023664
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 7447662
|c 34.19 GBP
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4656872
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 218895
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2777028
|
994 |
|
|
|a 92
|b IZTAP
|