Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | QA76.9 .A25 G743 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000175100 | |
![]() |
Main Library | QA76.9 .A25 G743 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000157946 |
Browsing Main Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .A25 D528 2008 Digital privacy : theory, technologies, and practices / | QA76.9 .A25 E5465 2006 Enterprise security : IT security solutions : concepts, practical experiences, technologies / | QA76.9 .A25 F45 2004 How to do everything to fight spam, viruses, pop-ups & spyware / | QA76.9 .A25 G743 2008 Gray hat hacking : the ethical hacker's handbook / | QA76.9 .A25 G7495 2006 Inside network security assessment : guarding your IT infrastructure / | QA76.9 .A25 H322 2006 Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / | QA76.9 .A25 I54 2008 Information security management handbook / |
Includes bibliographical references and index.
Part I. Introduction to ethical disclosure. Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure. Part II. Penetration testing and tools. Using metasploit -- Using the BackTrack LiveCD Linux distribution. Part III. Exploits 101. Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Basic Windows exploits. Part IV. Vulnerability analysis. Passive analysis -- Advanced static analysis with IDA pro -- Advanced reverse engineering -- Client-side browser exploits -- Exploiting Windows access control model for local elevation of privilege -- Intelligent fuzzing with Sulley -- From vulnerability to exploit -- Closing the holes: mitigation. Part V. Malware analysis. Collecting Malware and initial analysis -- Hacking Malware.
1 2
There are no comments on this title.