Image from Google Jackets

Gray hat hacking : the ethical hacker's handbook.

By: Harper, Allen [author.]Contributor(s): Regalado, Daniel [associated with work.]Material type: TextTextPublisher: New York : McGraw-Hill Education, [2018]Copyright date: ©2018Edition: 5th edition. Dr. Allen Harper [and eight others]Description: xxxi, 602 pages : illustrations (black and white) ; 23 cmContent type: text | still image Media type: unmediated Carrier type: volumeISBN: 9781260108415 (pbk.) :Subject(s): Computer security | Hackers | Computers and IT | Computers and ITDDC classification: 005.8 Summary: Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, this book explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
Holdings
Item type Current library Home library Shelving location Class number Status Date due Barcode Item reservations
Book Book Paul Hamlyn Library Paul Hamlyn Library Floor 1 005.8 HAR (Browse shelf(Opens below)) Issued 11/11/2024 06768601
Total reservations: 0

Previous edition: published as by Daniel Regalado and others. 2015.

Includes bibliographical references and index.

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, this book explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.

There are no comments on this title.

to post a comment.