|
|
|
|
LEADER |
00000nam a2200000 i 4500 |
001 |
MGH_AE9781264268955 |
003 |
IN-ChSCO |
005 |
20220922143747.0 |
006 |
m||||||||||||||||| |
007 |
cr |n||||||||n |
008 |
220922s2022||||nyu|||||o|||||||||||eng|| |
020 |
|
|
|a 9781264268955 (e-ISBN)
|
020 |
|
|
|a 1264268955 (e-ISBN)
|
020 |
|
|
|z 9781264268948 (print-ISBN)
|
020 |
|
|
|z 1264268947 (print-ISBN)
|
035 |
|
|
|z (OCoLC)1296942770
|
040 |
|
|
|a IN-ChSCO
|b eng
|e rda
|
041 |
0 |
|
|a eng
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 043000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Harper, Allen,
|e author.
|
245 |
1 |
0 |
|a Gray Hat Hacking :
|b The Ethical Hacker's Handbook, Sixth Edition /
|c Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost.
|
250 |
|
|
|a Sixth edition.
|
264 |
|
1 |
|a New York, N.Y. :
|b McGraw Hill LLC,
|c [2022]
|
264 |
|
4 |
|c ?2022
|
300 |
|
|
|a 1 online resource (752 pages) :
|b 120 illustrations.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
1 |
|
|a McGraw-Hill's AccessEngineeringLibrary
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I Preparation -- Chapter 1 Gray Hat Hacking -- Chapter 2 Programming Survival Skills -- Chapter 3 Linux Exploit Development Tools -- Chapter 4 Introduction to Ghidra -- Chapter 5 IDA Pro -- Part II Ethical Hacking -- Chapter 6 Red and Purple Teams -- Chapter 7 Command and Control (C2) -- Chapter 8 Building a Threat Hunting Lab -- Chapter 9 Introduction to Threat Hunting -- Part III Hacking Systems -- Chapter 10 Basic Linux Exploits -- Chapter 11 Advanced Linux Exploits -- Chapter 12 Linux Kernel Exploits -- Chapter 13 Basic Windows Exploitation -- Chapter 14 Windows Kernel Exploitation -- Chapter 15 PowerShell Exploitation -- Chapter 16 Getting Shells Without Exploits -- Chapter 17 Post-Exploitation in Modern Windows Environments -- Chapter 18 Next-Generation Patch Exploitation -- Part IV Hacking IoT -- Chapter 19 Internet of Things to Be Hacked -- Chapter 20 Dissecting Embedded Devices -- Chapter 21 Exploiting Embedded Devices -- Chapter 22 Software-Defined Radio -- Part V Hacking Hypervisors -- Chapter 23 Hypervisors 101 -- Chapter 24 Creating a Research Framework -- Chapter 25 Inside Hyper-V -- Chapter 26 Hacking Hypervisors Case Study -- Part VI Hacking the Cloud -- Chapter 27 Hacking in Amazon Web Services -- Chapter 28 Hacking in Azure -- Chapter 29 Hacking Containers -- Chapter 30 Hacking on Kubernetes -- Index.
|
530 |
|
|
|a Also available in print and PDF edition.
|
533 |
|
|
|a Electronic reproduction.
|b New York, N.Y. :
|c McGraw Hill,
|d 2022.
|n Mode of access: World Wide Web.
|n System requirements: Web browser.
|n Access may be restricted to users at subscribing institutions.
|
538 |
|
|
|a Mode of access: Internet via World Wide Web.
|
546 |
|
|
|a In English.
|
588 |
|
|
|a Description based on e-Publication PDF.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Computer hackers.
|
655 |
|
0 |
|a Electronic books.
|
700 |
1 |
|
|a Linn, Ryan,
|e author.
|
700 |
1 |
|
|a Sims, Stephen,
|e author.
|
700 |
1 |
|
|a Baucom, Michael,
|e author.
|
700 |
1 |
|
|a Tejeda, Huascar,
|e author.
|
700 |
1 |
|
|a Fernandez, Daniel,
|e author.
|
700 |
1 |
|
|a Frost, Moses,
|e author.
|
776 |
0 |
8 |
|i Print version:
|t Gray Hat Hacking : The Ethical Hacker's Handbook, Sixth Edition.
|b Sixth edition.
|d New York, N.Y. : McGraw-Hill Education, 2022
|z 9781264268948
|w (DLC) 2021925396
|w (OCoLC)1281655192
|
830 |
|
0 |
|a McGraw-Hill's AccessEngineeringLibrary.
|
856 |
4 |
0 |
|u https://accessengineeringlibrary.uam.elogim.com/content/book/9781264268948
|z Texto completo
|