S$73.63
  • + S$15.33 Delivery
Only 1 left in stock.
Ships from and sold by Amazon US.
Gray Hat Hacking, Second ... has been added to your Cart
Have one to sell?

Gray Hat Hacking, Second Edition Paperback – 16 February 2008

4.0 out of 5 stars 7 ratings

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
S$73.63
S$73.63
International product from outside Singapore Learn More.

Amazon International Store

  • International products have separate terms, are sold from abroad and may differ from local products, including fit, age ratings, and language of product, labeling or instructions.
  • Manufacturer warranty may not apply.
  • Learn more about Amazon International Store.
Arrives: 28 - 29 Jan.

There is a newer edition of this item:

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
S$61.51
(54)
Usually dispatched within 3 to 4 days.

Amazon International Store

  • International products have separate terms, are sold from abroad and may differ from local products, including fit, age ratings, and language of product, labeling or instructions.
  • Manufacturer warranty may not apply.
  • Learn more about Amazon International Store.
click to open popover
Best books of 2020
See top titles of the year

Product details

  • Language: : English
  • Paperback : 550 pages
  • ISBN-10 : 0071495681
  • ISBN-13 : 978-0071495684
  • Customer reviews:
    4.0 out of 5 stars 7 ratings

Product description

From the Back Cover

Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line code samples, detailed countermeasures, and moral disclosure procedures. Find out how to execute effective penetration tests, use fuzzers and sniffers, perform reverse engineering, and find security holes in Windows and Linux applications. You'll also learn how to trap and autopsy stealth worms, viruses, rootkits, adware, and malware.

  • Implement vulnerability testing, discovery, and reporting procedures that comply with applicable laws
  • Learn the basics of programming, stack operations, buffer overflow and heap vulnerabilities, and exploit development
  • Test and exploit systems using Metasploit and other tools
  • Break in to Windows and Linux systems with perl scripts, Python scripts, and customized C programs
  • Analyze source code using ITS4, RATS, FlawFinder, PREfast, Splint, and decompilers
  • Understand the role of IDA Pro scripts, FLAIR tools, and third-party plug-ins in discovering software vulnerabilities
  • Reverse-engineer software using decompiling, profiling, memory monitoring, and data flow analysis tools
  • Reveal client-side web browser vulnerabilities with MangleMe, AxEnum, and AxMan
  • Probe Windows Access Controls to discover insecure access tokens, security descriptors, DACLs, and ACEs
  • Find and examine malware and rootkits using honeypots, honeynets, and Norman SandBox technology

 

About the Author

Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

No customer reviews

5 star (0%) 0%
4 star (0%) 0%
3 star (0%) 0%
2 star (0%) 0%
1 star (0%) 0%
How are ratings calculated?

Review this product

Share your thoughts with other customers

Most helpful customer reviews on Amazon.com

Amazon.com: 4.0 out of 5 stars 7 reviews
Justin
3.0 out of 5 stars Good
19 January 2021 - Published on Amazon.com
Verified Purchase
Andrei Dascalu
4.0 out of 5 stars Perfect!
21 January 2010 - Published on Amazon.com
Verified Purchase
6 people found this helpful
MARMO72
3.0 out of 5 stars Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
13 February 2010 - Published on Amazon.com
Verified Purchase
alne
4.0 out of 5 stars Good content. May be a bit outdated now
19 October 2015 - Published on Amazon.com
Verified Purchase
Lee H
5.0 out of 5 stars Five Stars
20 November 2016 - Published on Amazon.com
Verified Purchase