Artboard 33Artboard 16Artboard 18Artboard 13Artboard 42Artboard 21Artboard 4Artboard 5Artboard 45Artboard 22Artboard 7Artboard 42Artboard 23Artboard 17?Artboard 28Artboard 43Artboard 49Artboard 47Artboard 15Artboard 32Artboard 6Artboard 22Artboard 5Artboard 25Artboard 1Artboard 42Artboard 11Artboard 41Artboard 11Artboard 23Artboard 10Artboard 4Artboard 9Artboard 6Artboard 8Artboard 7Artboard 3Artboard 12Artboard 25Artboard 34Artboard 43Artboard 44Artboard 16Artboard 24Artboard 13Artboard 5Artboard 24Artboard 31Artboard 1Artboard 12Artboard 27Artboard 30Artboard 36Artboard 44Artboard 9Artboard 17Artboard 6Artboard 27Artboard 30Artboard 29Artboard 26Artboard 2Artboard 20Artboard 35Artboard 15Artboard 14Artboard 50Artboard 26Artboard 14Artboard 40Artboard 21Artboard 10Artboard 37Artboard 46Artboard 33Artboard 8
e-book

Gray Hat Hacking The Ethical Hacker'apos;s Handbook, Fourth Edition (Cód: 9613306)

Harper,Allen; Harris,Shon; Allen,Harper,; Daniel Regalado

McGraw-Hill Education, LLC (Prof C/S) (Livros Digitais)

Ooops! Este produto não está mais a venda.
Mas não se preocupe, temos uma versão atualizada para você.

Ooopss! Este produto está fora de linha, mas temos outras opções para você.
Veja nossas sugestões abaixo!

R$ 141,43

em até 4x de R$ 35,36 sem juros

Total:

Em até 1x sem juros de


Crédito:
Boleto:
Cartão Saraiva:

Total:

Em até 4x sem juros de


Gray Hat Hacking The Ethical Hacker'apos;s Handbook, Fourth Edition

R$141,43

Descrição

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker'apos;s Handbook, Fourth Edition explains the enemy'apos;s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.

Build and launch spoofing exploits with Ettercap and Evilgrade

Induce error conditions and crash software using fuzzers

Hack Cisco routers, switches, and network hardware

Use advanced reverse engineering to exploit Windows and Linux software

Bypass Windows Access Control and memory protection schemes

Scan for flaws in Web applications using Fiddler and the x5 plugin

Learn the use-after-free technique used in recent zero days

Bypass Web authentication via MySQL type conversion and MD5 injection attacks

Inject your shellcode into a browser'apos;s memory using the latest Heap Spray techniques

Hijack Web browsers with Metasploit and the BeEF Injection Framework

Neutralize ransomware before it takes control of your desktop

Dissect Android malware with JEB and DAD decompilers

Find one-day vulnerabilities with binary diffing



Características

Peso 0.00 Kg
Produto sob encomenda Sim
Marca McGraw-Hill Education, LLC (Prof C/S) (Livros Digitais)
Número de Páginas 656 (aproximado)
Idioma 337
Acabamento e-book
Territorialidade Internacional
Gratuito Não
Tamanho do Arquivo 139901
Código do Formato Epub
Cód. Barras 9780071838504
Número da edição 4
Ano da Publicação 2015
AutorHarper,Allen; Harris,Shon; Allen,Harper,; Daniel Regalado