วันอาทิตย์ที่ 22 กุมภาพันธ์ พ.ศ. 2552

Gray Hat Hacking : The Ethical Hacker's Handbook

Gray Hat Hacking : The Ethical Hackers Handbook

Product Description


Analyze your companys vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hackers Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position.
Rate Points :4.0
Binding :Paperback
Label :McGraw-Hill Osborne Media
Manufacturer :McGraw-Hill Osborne Media
ProductGroup :Book
Studio :McGraw-Hill Osborne Media
Publisher :McGraw-Hill Osborne Media
UPC :783254044098
EAN :9780072257090
Price :$49.99USD
Lowest Price :$10.00USD
Customer ReviewsGreat book
Rating Point :4 Helpful Point :0
What a great book. From no skillz to haxor writing shellcode, Id recommend this to any academic institution wishing to teach on security. The first few chapters arent overly exciting, but finding a book that gives fair coverage to topics like Linux shellcode development, client-side attacks on Windows, IDA pro usage, fuzzing, and more is no easy find!

Great job guys!
jrod
this book is a waste of good paper
Rating Point :1 Helpful Point :4
I have been condicting ethical hacking for 3 years and this book was such a let down, it falls well short in providing and good detailed content. Basically its the kind of stuff you learn on day 1 and shows no evidence of experience from an author who can hack into systems. My advise is save your money as this book covers nothing you wouldnt find on Google in 5 minutes. You know it is so bad I think I will write my own book.

My advise google, wireshark, nmap and netcat the content you get it 5 minutes will be as good as this book.
Average
Rating Point :3 Helpful Point :0
Nutshell review - The book title is a good attention grabber but I think the content could have been more extensive. An average book but still worth a read.
A good guide for the beginner ethical hacker.
Rating Point :4 Helpful Point :2
There is alot of good knowledge to be learned in this book, but it is very cutthroat and dry. There are almost no "real world" examples of what they talk about, and alot of it talks about using programs that were created for linux.. Otherwise it is a good book, but I have read better.
Another revolutionary book from a revolutionary author!
Rating Point :5 Helpful Point :1
Now Listen...


I know some of you look at these books as if its a world of training people to be hackers. Now, maybe these books might create a few bad seeds, but they usually create a lot of good ones..

This book is astounding, I bought this book because I love researching all about hacking, security, and protection. My major is computer science and I am hoping to be a professional white hat security professional, a hacker that is hired to show the flaws in sites.

Now,when people see these books and say...this is madness!! books about hacking?!

I think these books are great.They help you protect yourself, your computer, your company, your website, your server.

This book shows a lot what hackers use...and the more you know about it, the better you can protect yourself.If you think that this trains bad hackers, well we cant change how some people use information.What I can tell you is that a lot of people will be better off with the information in this book for the companies and servers.

This author is excellent!
Great book!
Similar Item
  • Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (Radia Perlman Series in Computer Networking and Security)
  • Hacking Exposed 5th Edition: Network Security Secrets And Solutions
  • Google Hacking for Penetration Testers, Volume 2
  • CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
  • Hacking: The Art of Exploitation, 2nd Edition
  • Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundatio

    ไม่มีความคิดเห็น:

    แสดงความคิดเห็น