Gray hat hacking : the ethical hacker's handbook.
Material type: TextPublisher: New York : McGraw-Hill Education, [2018]Copyright date: ©2018Edition: 5th edition. Dr. Allen Harper [and eight others]Description: xxxi, 602 pages : illustrations (black and white) ; 23 cmContent type: text | still image Media type: unmediated Carrier type: volumeISBN: 9781260108415 (pbk.) :Subject(s): Computer security | Hackers | Computers and IT | Computers and ITDDC classification: 005.8 Summary: Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, this book explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.Item type | Current library | Home library | Shelving location | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|---|
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 HAR (Browse shelf(Opens below)) | Issued | 11/11/2024 | 06768601 |
Total reservations: 0
Browsing Paul Hamlyn Library shelves, Shelving location: Floor 1 Close shelf browser (Hides shelf browser)
Previous edition: published as by Daniel Regalado and others. 2015.
Includes bibliographical references and index.
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, this book explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
There are no comments on this title.
Log in to your account to post a comment.