Gray Hat Hacking The Ethical Hackers Handbook, 3/e (Paperback)
暫譯: 灰帽駭客:道德駭客手冊(第三版)

Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams

  • 出版商: McGraw-Hill Education
  • 出版日期: 2011-01-06
  • 售價: $2,250
  • 貴賓價: 9.5$2,138
  • 語言: 英文
  • 頁數: 720
  • 裝訂: Paperback
  • ISBN: 0071742557
  • ISBN-13: 9780071742559
  • 相關分類: 駭客 Hack
  • 已過版

買這商品的人也買了...

商品描述

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

  • Develop and launch exploits using BackTrack and Metasploit
  • Employ physical, social engineering, and insider attack techniques
  • Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
  • Understand and prevent malicious content in Adobe, Office, and multimedia files
  • Detect and block client-side, Web server, VoIP, and SCADA attacks
  • Reverse engineer, fuzz, and decompile Windows and Linux software
  • Develop SQL injection, cross-site scripting, and forgery exploits
  • Trap malware and rootkits using honeypots and SandBoxes

商品描述(中文翻譯)

最新揭露當今最具破壞性攻擊的策略

透過使用尖端技術來發現和修復安全漏洞,來阻止惡意的網路入侵。《Gray Hat Hacking: The Ethical Hacker's Handbook》第三版已全面更新並擴充了九個新章節,詳細說明了最新的漏洞及其修補方法,以及法律披露的方法。向專家學習黑客如何針對系統、擊敗生產計劃、編寫惡意代碼,並利用 Windows 和 Linux 系統中的漏洞。本書還涵蓋了惡意軟體分析、滲透測試、SCADA、VoIP 和網路安全等內容。

- 使用 BackTrack 和 Metasploit 開發和啟動攻擊
- 採用物理、社會工程和內部攻擊技術
- 建立 Perl、Python 和 Ruby 腳本以啟動堆疊緩衝區溢出
- 理解並防止 Adobe、Office 和多媒體文件中的惡意內容
- 偵測並阻止客戶端、網路伺服器、VoIP 和 SCADA 攻擊
- 反向工程、模糊測試和反編譯 Windows 和 Linux 軟體
- 開發 SQL 注入、跨站腳本和偽造攻擊
- 使用蜜罐和沙盒捕捉惡意軟體和根套件

最後瀏覽商品 (20)