Absolutely Australia's Lowest Prices

Turn your Clutter Into Cash with SmartSell.TM Book a Courier Pickup Today!

Gray Hat Hacking
By

Rating

Product Description
Product Details

Table of Contents

Part 1: Preparation
Chapter 1: Why Gray Hat hacking? Ethics and Law
Chapter 2: Programming Survival Skills
Chapter 3: Next Generation Fuzzing
Chapter 4: Next Generation Reverse Engineering
Chapter 5: Software Defined Radios (SDR)

Part 2: Business of Hacking
Chapter 6: So You Want to Be a Pentester?
Chapter 7: Red Team vs. Blue Team
Chapter 8: Next Generation Security Operations
Chapter 9: Bug Bounty Programs

Part 3: Exploiting Systems
Chapter 10: Getting Shells without Exploits
Chapter 11: Basic Linux Exploits
Chapter 12: Advance Linux Exploits
Chapter 13: Windows Exploits
Chapter 14: Bypassing Windows Memory Protections
Chapter 15: Powershell Exploitation
Chapter 16: Next Generation Exploitation of Web Applications
Chapter 17: Next Generation Patch Exploitation

Part 4: Advanced Malware Analysis
Chapter 18: Dissecting Mobile Malware
Chapter 19: Dissecting Ransomware
Chapter 20: ATM Malware
Chapter 21: Deception: Next Generation Honeypots

Part 5: Internet of Things (IoT)
Chapter 22: Internet of Things to be Hacked
Chapter 23: Dissecting Embedded Devices
Chapter 24: Exploiting Embedded Devices
Chapter 25: Exploiting the Internet of Things

About the Author

Dr. Allen Harper, CISSP, PCI QSA, was the founder of N2NetSecurity, Inc. He currently serves as the EVP and Chief Hacker at Tangible Security.Daniel Regalado is a security researcher with more than 14 years in the security field, dissecting Zero Days and APTs targeting Organizations, ATMs, and IoT devices. Ryan Linn is a Director of Security with Nuix who has a passion for making security knowledge accessible. Stephen Sims is an industry expert with over 15 years of experience in information technology and security. He currently works as a consultant performing reverse engineering, exploit development, threat modeling, and penetration testing. Branko Spasojevic is a security engineer at Google's Detection & Response team. Linda Martinez Hahaj serves as the VP of Operations of Tangible Security. She is a proven information security professional with 17 years of experience.Michael Baucom works for Tangible Security as the VP of Research and Development. He has worked on a wide variety of projects, including software security assessments, tool development, and penetration tests. Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Post Graduate School in Monterey, CA. He has authored several books, frequently speaks at security conferences, and has contributed several popular open source tools for the security field.Shon Harris was the president of Logical Security, a security consultant, a former engineer in the Air Force's Information Warfare unit, an instructor, and an author. She wrote many books, including the best-selling CISSP Exam Guide.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top