Gray hat hacking : the ethical hacker's handbook /
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , , , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
[2018]
|
Edición: | Fifth edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Why gray hat hacking? Ethics and law
- Programming survival skills
- Next-generation fuzzing
- Next-generation reverse engineering
- Software-defined radio
- So you want to be a pen tester?
- Red teaming operations
- Purple teaming
- Bug bounty programs
- Exploiting systems
- Getting shells without exploits
- Basic Linux exploits
- Advanced Linux exploits
- Windows exploits
- Advanced Windows exploitation
- PowerShell exploitation
- Next-generation web application exploitation
- Next-generation patch exploitation
- Dissecting mobile malware
- Dissecting ransomware
- ATM malware
- Deception: next-generation honeypots
- Internet of things
- Internet of things to be hacked
- Dissecting embedded devices
- Exploiting embedded devices
- Fighting IoT malware.