Gray hat hacking: the ethical hacker's handbook
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics...
Gespeichert in:
Beteiligte Personen: | , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
McGraw-Hill Education
[2018]
|
Ausgabe: | Fifth edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781260108422/?ar |
Zusammenfassung: | Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. The new topic of exploiting the Internet of things is introduced in this edition. -- From publisher's description |
Beschreibung: | Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper [and others]. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781260108422 1260108422 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047559225 | ||
003 | DE-627-1 | ||
005 | 20240228120528.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781260108422 |c electronic bk. |9 978-1-260-10842-2 | ||
020 | |a 1260108422 |9 1-260-10842-2 | ||
035 | |a (DE-627-1)047559225 | ||
035 | |a (DE-599)KEP047559225 | ||
035 | |a (ORHE)9781260108422 | ||
035 | |a (DE-627-1)047559225 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Harper, Allen |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Gray hat hacking |b the ethical hacker's handbook |c Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris |
250 | |a Fifth edition. | ||
264 | 1 | |a New York |b McGraw-Hill Education |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper [and others]. - Includes bibliographical references and index. - Print version record | ||
520 | |a Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. The new topic of exploiting the Internet of things is introduced in this edition. -- From publisher's description | ||
650 | 0 | |a Penetration testing (Computer security) |v Handbooks, manuals, etc | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc | |
650 | 0 | |a Hackers | |
650 | 4 | |a Tests d'intrusion ; Guides, manuels, etc | |
650 | 4 | |a Sécurité informatique ; Guides, manuels, etc | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a handbooks | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Guides et manuels | |
655 | 2 | |a Handbook | |
700 | 1 | |a Regalado, Daniel |e VerfasserIn |4 aut | |
700 | 1 | |a Linn, Ryan |e VerfasserIn |4 aut | |
700 | 1 | |a Sims, Stephen |e VerfasserIn |4 aut | |
700 | 1 | |a Spasojevic, Branko |e VerfasserIn |4 aut | |
700 | 1 | |a Martinez, Linda |e VerfasserIn |4 aut | |
700 | 1 | |a Baucom, Michael |e VerfasserIn |4 aut | |
700 | 1 | |a Eagle, Chris |e VerfasserIn |4 aut | |
700 | 1 | |a Harris, Shon |e VerfasserIn |4 aut | |
776 | 1 | |z 9781260108415 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781260108415 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781260108422/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047559225 |
---|---|
_version_ | 1821494881927823360 |
adam_text | |
any_adam_object | |
author | Harper, Allen Regalado, Daniel Linn, Ryan Sims, Stephen Spasojevic, Branko Martinez, Linda Baucom, Michael Eagle, Chris Harris, Shon |
author_facet | Harper, Allen Regalado, Daniel Linn, Ryan Sims, Stephen Spasojevic, Branko Martinez, Linda Baucom, Michael Eagle, Chris Harris, Shon |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | Harper, Allen |
author_variant | a h ah d r dr r l rl s s ss b s bs l m lm m b mb c e ce s h sh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047559225 (DE-599)KEP047559225 (ORHE)9781260108422 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fifth edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03281cam a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-047559225</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120528.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781260108422</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-260-10842-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1260108422</subfield><subfield code="9">1-260-10842-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047559225</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047559225</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781260108422</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047559225</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harper, Allen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Gray hat hacking</subfield><subfield code="b">the ethical hacker's handbook</subfield><subfield code="c">Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fifth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">McGraw-Hill Education</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper [and others]. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. The new topic of exploiting the Internet of things is introduced in this edition. -- From publisher's description</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">handbooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guides et manuels</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Handbook</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Regalado, Daniel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Linn, Ryan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sims, Stephen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Spasojevic, Branko</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martinez, Linda</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baucom, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eagle, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harris, Shon</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781260108415</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781260108415</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781260108422/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
genre | Handbook |
genre_facet | Handbook |
id | ZDB-30-ORH-047559225 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:26Z |
institution | BVB |
isbn | 9781260108422 1260108422 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | McGraw-Hill Education |
record_format | marc |
spelling | Harper, Allen VerfasserIn aut Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris Fifth edition. New York McGraw-Hill Education [2018] ©2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper [and others]. - Includes bibliographical references and index. - Print version record Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. The new topic of exploiting the Internet of things is introduced in this edition. -- From publisher's description Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Pirates informatiques Computer security Penetration testing (Computer security) handbooks Handbooks and manuals Guides et manuels Handbook Regalado, Daniel VerfasserIn aut Linn, Ryan VerfasserIn aut Sims, Stephen VerfasserIn aut Spasojevic, Branko VerfasserIn aut Martinez, Linda VerfasserIn aut Baucom, Michael VerfasserIn aut Eagle, Chris VerfasserIn aut Harris, Shon VerfasserIn aut 9781260108415 Erscheint auch als Druck-Ausgabe 9781260108415 |
spellingShingle | Harper, Allen Regalado, Daniel Linn, Ryan Sims, Stephen Spasojevic, Branko Martinez, Linda Baucom, Michael Eagle, Chris Harris, Shon Gray hat hacking the ethical hacker's handbook Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Pirates informatiques Computer security Penetration testing (Computer security) handbooks Handbooks and manuals Guides et manuels |
title | Gray hat hacking the ethical hacker's handbook |
title_auth | Gray hat hacking the ethical hacker's handbook |
title_exact_search | Gray hat hacking the ethical hacker's handbook |
title_full | Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris |
title_fullStr | Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris |
title_full_unstemmed | Gray hat hacking the ethical hacker's handbook Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris |
title_short | Gray hat hacking |
title_sort | gray hat hacking the ethical hacker s handbook |
title_sub | the ethical hacker's handbook |
topic | Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Pirates informatiques Computer security Penetration testing (Computer security) handbooks Handbooks and manuals Guides et manuels |
topic_facet | Penetration testing (Computer security) Handbooks, manuals, etc Computer security Handbooks, manuals, etc Hackers Tests d'intrusion ; Guides, manuels, etc Sécurité informatique ; Guides, manuels, etc Pirates informatiques Computer security Penetration testing (Computer security) handbooks Handbooks and manuals Guides et manuels Handbook |
work_keys_str_mv | AT harperallen grayhathackingtheethicalhackershandbook AT regaladodaniel grayhathackingtheethicalhackershandbook AT linnryan grayhathackingtheethicalhackershandbook AT simsstephen grayhathackingtheethicalhackershandbook AT spasojevicbranko grayhathackingtheethicalhackershandbook AT martinezlinda grayhathackingtheethicalhackershandbook AT baucommichael grayhathackingtheethicalhackershandbook AT eaglechris grayhathackingtheethicalhackershandbook AT harrisshon grayhathackingtheethicalhackershandbook |