Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (English, Paperback, Harper Allen)

Share

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition  (English, Paperback, Harper Allen)

4.3
350 Ratings & 32 Reviews
₹1,008
1,150
12% off
Hurry, Only 1 left!
Available offers
  • Bank Offer5% Unlimited Cashback on Flipkart Axis Bank Credit Card
    T&C
  • Bank Offer5% off* with Axis Bank Buzz Credit Card
    T&C
  • No Cost EMI on Flipkart Axis Bank Credit Card
    T&C
  • Delivery
    Check
    Enter pincode
      Usually delivered in6-7 days
      ?
      Enter pincode for exact delivery dates/charges
    View Details
    Author
    Read More
    Highlights
    • Language: English
    • Binding: Paperback
    • Publisher: Tata McGraw-Hill Education India
    • Genre: Computers
    • ISBN: 9780071077316, 9780071077316
    Services
    • 10 Days Replacement Policy
      ?
    • Cash on Delivery available
      ?
    Seller
    BOOKCENTRE
    3.4
    • 10 Days Replacement Policy
      ?
  • View more sellers starting from 1,008
  • Description

    THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

    Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

    • Develop and launch exploits using BackTrack and Metasploit
    • Employ physical, social engineering, and insider attack techniques
    • Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
    • Understand and prevent malicious content in Adobe, Office, and multimedia files
    • Detect and block client-side, Web server, VoIP, and SCADA attacks
    • Reverse engineer, fuzz, and decompile Windows and Linux software
    • Develop SQL injection, cross-site scripting, and forgery exploits
    • Trap malware and rootkits using honeypots and SandBoxes
    Read More
    Specifications
    Book Details
    Imprint
    • India Professional
    Dimensions
    Width
    • 78 mm
    Height
    • 614 mm
    Length
    • 469 mm
    Weight
    • 512 gr
    Frequently Bought Together
    1 Item
    1,008
    2 Add-ons
    3,824
    Total
    4,832
    Ratings & Reviews
    4.3
    350 Ratings &
    32 Reviews
    • 5
    • 4
    • 3
    • 2
    • 1
    • 212
    • 86
    • 25
    • 11
    • 16
    5

    comprehensive coverage about different topics of Computer Security

    This book starts with ethical and legal aspects of penetration testing, then covers different technical aspects of penetration testing, shared about windows and linux exploits, vulnerability scanning related concepts, then about incident mitigation strategies and last but not least nice information about catching malware using honeypots/honeynets and then briefed about ways of dealing malware to understand it better.

    A helpful book that is well worth to be in every computer security guy's in...
    READ MORE

    Raghu Veer D

    Certified Buyer

    Aug, 2012

    27
    7
    Report Abuse
    5

    Great reference

    This is a good book to get you started in this great field of INFOSEC.All the content is well explained with examples and extra references are given to expand your knowledge base.Book explains the techniques and framework that are used in pentesting and writing exploits.
    READ MORE

    Sanjeev Jha

    Certified Buyer

    Jul, 2012

    4
    1
    Report Abuse
    5

    A good book for beginners

    This book provides all details of required tools for hacking in simple and easy language. At the same time it also gives details about the law and penalties a person can face with illegal activities of hacking. A person wanto to have basic knowledge of hacking along with ethical issues can go for it. Thanks to Flipkart for fast, safe and secure delivery.
    READ MORE

    Rajesh C. Yadav

    Certified Buyer, Surat

    Aug, 2016

    19
    22
    Report Abuse
    5

    Worth every penny

    very fantastic book. contains proper explanations and examples for justification and better understanding. it's really helpful for a good and thorough understand
    READ MORE

    Anjali Sethi

    Certified Buyer, Ghaziabad

    Jun, 2018

    0
    0
    Report Abuse
    5

    Worth every penny

    #Review_by_Prashant_pk#AAE#Honest_Reviewer

    I COMPLETELY LOVED THIS BOOK FOR THE PRICE MENTIONED as a "beginner" Well now that I read the entire book I can assure you that if you are searching for the beginner step in IT Field then this one is sure a step to take. I M REVIEWER AND A HONEST ONE

    #WORTH THE THE MONEY
    READ MORE

    Prashant

    Certified Buyer, Bhadohi

    Sep, 2017

    0
    1
    Report Abuse
    5

    A book worth buying

    As soon as the book was delivered, i started reading.
    I had no doubt about its quality and content, because the authors are well-known personalities in information security industry. esp. Shon Harris. I have preivously read her books on CISSP prep and i am very much happy to have this book with me, its a good resource for startups and pros in the information security field.
    This book is nicely structured and presentation is tip-top
    Also, the content in the book has most of security loops tha...
    READ MORE

    KRAPESH BHATT

    Certified Buyer, Surat

    Feb, 2014

    0
    2
    Report Abuse
    4

    ABOUT GRAY hAT HACKING

    this book is awesome u should go through this book it really help
    in linux exploits, metasploit exploits, windows exploits,and many many more things




    if u know a bit bout hacking then only preffer this book
    READ MORE

    kedar

    Certified Buyer

    Apr, 2012

    31
    7
    Report Abuse
    4

    Very Good

    users startup handbook......worth it for 💰
    READ MORE

    KN RAJU IT ADMIN

    Certified Buyer, West Godavari

    8 months ago

    5
    0
    Report Abuse
    5

    Awesome book

    If you wanna learn real hacking then this book is for. Unlike other books which makes you script kiddies this book will turn you into a real hacker who can exploit vulnerabilities in a system. It starts off with hacking laws, continues with shell coding for Linux and Windows, web application hacking and finally mitigating attacks.
    READ MORE

    Karthik Panjaje

    May, 2012

    2
    1
    Report Abuse
    5

    Just wow!

    Nice book for beginners
    READ MORE

    Vigneshwar Reddy

    Certified Buyer, Hyderabad

    May, 2017

    1
    0
    Report Abuse
    +
    All 32 reviews
    Questions and Answers
    Q:Which os Is needed?
    A:Kali Linux/Parrot Sec
    ????? ?????
    Certified Buyer
    6
    0
    Report Abuse
    Q:i want to learn hacking and i have no knowledge about hacking so this book will help me or not if not then suggest me one please
    A:You get the basic knowledge about hacking by watching YouTube tutorials then you use this book for improve your experience.... In Ethetical
    Anonymous
    Certified Buyer
    7
    1
    Report Abuse
    Q:What type of hacking?
    A:well its more about the detail of hacking rather than an actual hacking or black hat hacking ,it covers most of the common areas of Hacking
    Prashant
    Certified Buyer
    6
    7
    Report Abuse
    Q:hacking programing demo here in book ? 100% helping for hacking in book?
    A:Yes
    HERITAGEPUBLISHERS
    Flipkart Seller
    0
    0
    Report Abuse
    Q:I don't no about hacking this book is help for me Or not pls tell anybody
    A:Not
    HERITAGEPUBLISHERS
    Flipkart Seller
    0
    0
    Report Abuse
    Q:Haching code is present in this book
    A:Not
    HERITAGEPUBLISHERS
    Flipkart Seller
    0
    0
    Report Abuse
    Q:how to hack
    A:You have to install Kali Linux on your PC if you are in begging stage don't follow this book :-)
    Anonymous
    Certified Buyer
    0
    0
    Report Abuse
    Q:does it cover about wireless hacking , social media hacking, etc?? need an answer asap
    A:no
    ????? ?????
    Certified Buyer
    0
    0
    Report Abuse
    Didn't get the right answer you were looking for
    Safe and Secure Payments.Easy returns.100% Authentic products.
    You might be interested in
    Applied Sciences and Other Technologies Books
    Min 10% off
    Shop Now
    Electronics and Communications Engineering Books
    Min 10% off
    Shop Now
    Mathematics and Science Books
    Min 20% off
    Shop Now
    Business and Management Books
    Min 20% off
    Shop Now
    Back to top