000 | 02806cam a2200493Ii 4500 | ||
---|---|---|---|
999 |
_c4372 _d4372 |
||
001 | 904597568 | ||
003 | OCoLC | ||
005 | 20181208084020.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150310s2015 nyua ob 001 0 eng d | ||
020 | _a9780071838504 | ||
020 | _a0071838503 | ||
020 | _z9780071832380 | ||
020 | _z0071832386 | ||
035 | _a(OCoLC)904597568 | ||
037 |
_aCL0500000566 _bSafari Books Online |
||
040 |
_aUMI _beng _erda _epn _cUMI _dSTF _dB24X7 _dCOO _dOH1 _dUtOrBLW |
||
049 | _aOH1A | ||
050 | 4 | _aQA76.9.A25 | |
082 | _a005.8 | ||
100 | 1 |
_aRegalado, Daniel, _eauthor. |
|
245 | 1 | 0 |
_aGray hat hacking : _bthe ethical hacker's handbook / _cDaniel Regalado [and 7 others]. |
246 | 3 | 0 | _aEthical hacker's handbook. |
250 | _aFourth edition. | ||
260 |
_aNew York : _bMcGraw-Hill Education, _c2015 |
||
300 |
_a1 online resource (1 volume) : _billustrations. |
||
336 |
_atext _btxt _2rdacontent. |
||
337 |
_acomputer _bc _2rdamedia. |
||
338 |
_aonline resource _bcr _2rdacarrier. |
||
504 | _aIncludes bibliographical references and index. | ||
506 | _aAvailable to OhioLINK libraries. | ||
520 | _aThis fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. -- | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aHackers. | |
650 | 0 | _aHacking. | |
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic books. | |
710 | 2 | _aOhio Library and Information Network. | |
776 | 0 | 8 |
_iPrint version : _aRegalado, Daniel. _tGray hat hacking. _bFourth edition. _dNew York : McGraw-Hill, [2015] _z9780071832380 _w(OCoLC)900478166. |
856 | 4 | 0 |
_3Safari Books Online _uhttp://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9780071832380 _zConnect to resource |
856 | 4 | 0 |
_3Safari Books Online _uhttp://proxy.ohiolink.edu:9099/login?url=http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9780071832380 _zConnect to resource (off-campus) |
942 |
_2ddc _cBK |