Coverart for item
The Resource Gray hat hacking : the ethical hacker's handbook, Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris

Gray hat hacking : the ethical hacker's handbook, Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris

Label
Gray hat hacking : the ethical hacker's handbook
Title
Gray hat hacking
Title remainder
the ethical hacker's handbook
Statement of responsibility
Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris
Creator
Contributor
Author
Subject
Genre
Language
eng
Cataloging source
UMI
http://library.link/vocab/creatorName
Harper, Allen
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
  • handbooks
http://library.link/vocab/relatedWorkOrContributorName
  • Regalado, Daniel
  • Linn, Ryan
  • Sims, Stephen
  • Spasojevic, Branko
  • Martinez, Linda
  • Baucom, Michael
  • Eagle, Chris
  • Harris, Shon
http://library.link/vocab/subjectName
  • Penetration testing (Computer security)
  • Computer security
  • Hackers
Label
Gray hat hacking : the ethical hacker's handbook, Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9781260108422
Instantiates
Publication
Copyright
Note
Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper ... [et al.]
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Why gray hat hacking? Ethics and law -- Programming survival skills -- Next-generation fuzzing -- Next-generation reverse engineering -- Software-defined radio -- So you want to be a pen tester? -- Red teaming operations -- Purple teaming -- Bug bounty programs -- Exploiting systems -- Getting shells without exploits -- Basic Linux exploits -- Advanced Linux exploits -- Windows exploits -- Advanced Windows exploitation -- PowerShell exploitation -- Next-generation web application exploitation -- Next-generation patch exploitation -- Dissecting mobile malware -- Dissecting ransomware -- ATM malware -- Deception: next-generation honeypots -- Internet of things -- Internet of things to be hacked -- Dissecting embedded devices -- Exploiting embedded devices -- Fighting IoT malware
Control code
on1043671342
Dimensions
unknown
Edition
Fifth edition.
Extent
1 online resource (1 volume)
Form of item
online
Isbn
9781260108422
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Sound
unknown sound
Specific material designation
remote
Stock number
CL0500000977
System control number
  • (Sirsi) o1043671342
  • (OCoLC)1043671342
Label
Gray hat hacking : the ethical hacker's handbook, Dr. Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Shon Harris
Link
http://databases.mvlc.org/connect/safari?uiCode=&xmlId=9781260108422
Publication
Copyright
Note
Revised edition of: Gray hat hacking : the ethical hacker's handbook / Allen Harper ... [et al.]
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Why gray hat hacking? Ethics and law -- Programming survival skills -- Next-generation fuzzing -- Next-generation reverse engineering -- Software-defined radio -- So you want to be a pen tester? -- Red teaming operations -- Purple teaming -- Bug bounty programs -- Exploiting systems -- Getting shells without exploits -- Basic Linux exploits -- Advanced Linux exploits -- Windows exploits -- Advanced Windows exploitation -- PowerShell exploitation -- Next-generation web application exploitation -- Next-generation patch exploitation -- Dissecting mobile malware -- Dissecting ransomware -- ATM malware -- Deception: next-generation honeypots -- Internet of things -- Internet of things to be hacked -- Dissecting embedded devices -- Exploiting embedded devices -- Fighting IoT malware
Control code
on1043671342
Dimensions
unknown
Edition
Fifth edition.
Extent
1 online resource (1 volume)
Form of item
online
Isbn
9781260108422
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
Sound
unknown sound
Specific material designation
remote
Stock number
CL0500000977
System control number
  • (Sirsi) o1043671342
  • (OCoLC)1043671342

Library Locations

    • Merrimack Valley Library ConsortiumBorrow it
      4 High Street, Suite 175, North Andover, MA, 01845, US
      42.7009413 -71.1255084
Processing Feedback ...