Fully expanded to cover the latest devious hacking methods, the third edition of this bestselling ethical hacking and security testing book provides in-depth, advanced coverage of vulnerability discovery and reverse engineering.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Allen Harper, CISSP, a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC.
Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and a bestselling author. She was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.
Jonathan Ness is a software security engineer at Microsoft. He is a member of an Air National Guard unit where he leads network penetration tests against military facilities across the country and helps define the information warfare aggressor mission for the Air Force.
Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California. A computer engineer/scientist for 25 years, his research interests include computer network attack and defense, computer forensics, and reverse/anti-reverse engineering. He can often be found teaching at Black Hat or spending late nights working on capture the flag at Defcon
Gideon J. Lenkey, CISSP co-founded Ra Security Systems, a network security monitoring and consultancy. He has provided advanced training to the FBI and is the sitting president of the FBI's InfraGard chapter in New Jersey.
Terron Williams, NSA IAM-IEM, CEH, CSSLP, works for Elster Electricity as a Senior Test Engineer with his primary focus on Smart Grid Security. He has served on the editorial board for Hakin9 Magazine.Présentation de l'éditeur :
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Description du livre Paperback. État : New. New Softcover International Edition, Printed in Black and White, Only USPS Media mail Shipping ONLY, Different ISBN, Same Content As US edition, Book Cover may be Different, in English Language. N° de réf. du libraire 13037
Description du livre tata. PaperBack. État : Brand New. International Edition. International Edition, Cover & ISBN may be different from US edition, PAPERBACK. Book Condition: New. Brand New,Softcover,No Access code & No context dvd, But Contents are same as US Edition. Printed in English Language, Prompt shipping by USPS/,UPS/,DHL/,FedEx. Exceptional customer Service, Satisfaction Guaranteed. We may ship the books from Asian regions for inventory purpose. "Special Note" We do provide service on APO BOX & PO BOX addresses only in usa. N° de réf. du libraire Aaddi13665
Description du livre État : Brand New. PAPERBACK,Book Condition New, Brand New, Softcover, International Edition. We Do not Ship APO FPO AND PO BOX. Cover Image & ISBN may be different from US edition but contents as US Edition. Printing in English language. Quick delivery by USPS/UPS/DHL/FEDEX/ARAMEX ,Customer satisfaction guaranteed. We may ship the books from Asian regions for inventory purpose. N° de réf. du libraire ABESTTND2475
Description du livre McGraw-Hill Osborne Media. PAPERBACK. État : New. 0071742557 New Book. International Edition with great quality. Fast delivery is guaranteed!!. N° de réf. du libraire INDMRK-9780071077316
Description du livre État : Brand New. Brand New Paperback International Edition, Perfect Condition. Printed in English. Excellent Quality, Service and customer satisfaction guaranteed!. N° de réf. du libraire AIND-42567
Description du livre État : New. New. SoftCover International edition. Different ISBN and Cover image but contents are same as US edition.Perfect condition. Ship by express service to USA, Canada, Australia, France, Italy, UK, Germany and Netherland. Customer satisfaction our priority. N° de réf. du libraire ABE-190516-1454
Description du livre État : Brand New. New. SoftCover International edition. Different ISBN and Cover image but contents are same as US edition. Customer Satisfaction guaranteed!!. N° de réf. du libraire SHAK1454
Description du livre État : New. Brand New Paperback International Edition.We Ship to PO BOX Address also. EXPEDITED shipping option also available for faster delivery. N° de réf. du libraire AUSBNEW-42567
Description du livre 2011. Soft cover. État : New. This book is BRAND NEW Soft cover International edition with black and white printing. ISBN number & cover page may be different but contents identical to the US edition word by word. Book is in English language. N° de réf. du libraire UN-TM-IN-586
Description du livre McGraw-Hill Osborne Media, 2011. État : New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Fully expanded to cover the latest devious hacking methods, the third edition of this bestselling ethical hacking and security testing book provides in-depth, advanced coverage of vulnerability discovery and reverse engineering. N° de réf. du libraire ABE_book_new_0071742557