• Gray Hat Hacking: The Ethical Hacker's Handbook See large image

    Gray Hat Hacking: The Ethical Hacker's Handbook (Paperback) By (author) Shon Harris, By (author) Allen Harper, By (author) Chris Eagle, By (author) Jonathan Ness, By (author) Michael Lester


    Sorry we can't get this title, the button below links through to AbeBooks who may have this title (opens in new window).

    Try AbeBooks | Add to wishlist

    DescriptionAnalyze your company's vulnerability to hacks with expert guidance from "Gray Hat Hacking: The Ethical Hacker's Handbook". Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position.

Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10


Reviews | Bibliographic data
  • Full bibliographic data for Gray Hat Hacking

    Gray Hat Hacking
    The Ethical Hacker's Handbook
    Authors and contributors
    By (author) Shon Harris, By (author) Allen Harper, By (author) Chris Eagle, By (author) Jonathan Ness, By (author) Michael Lester
    Physical properties
    Format: Paperback
    Number of pages: 434
    Width: 188 mm
    Height: 224 mm
    Thickness: 24 mm
    Weight: 780 g
    ISBN 13: 9780072257090
    ISBN 10: 0072257091

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    LC subject heading:
    BIC subject category V2: UTN, URY
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading: ,
    Thema V1.0: UTN, URY
    McGraw-Hill Education - Europe
    Imprint name
    McGraw-Hill Publishing Co.
    Publication date
    16 November 2004
    Publication City/Country
    Author Information
    Shon Harris (Fairchild Air Force Base, WA) MCSE, CISSP, is a security consultant who provides security assessments and analysis, vulnerability testing, and solutions to a wide range of different businesses. Allen Harper (Burke, VA) has served in the Marine Corps for 16 years as both enlisted and an officer. Currently, he serves as a security engineer in the US Department of Defense. Chris Eagle (Monterey, CA) is the Associate Chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, CA. Michael J. Lester (Miami, FL) CISSP, MCSE, MCSA, MCT, CCNP, CCDP, CCSE+, CCI, CCEA, CTT+, Linux+, Security+, Network+, I-net+, A+, holds a Bachelor of Science degree in Information Technology, and is a senior consultant and instructor for MicroLink Corporation.
    Review quote
    Excerpts from review by Patrick Mueller ... a proficient work...offers a smorgasbord of topics geared towards moderate- and advanced-level practitioners...The authors touch on some deep technical issues, such as automated penetration testing and shellcode exploit construction...great command of the material...[authors] discuss a few refreshingly different topics -- such as vulnerability disclosure protocols -- that are hardly covered elsewhere. The authors did...deliver on their ethical obligations to provide accurate countermeasures to attack methods they describe -- a true value to readers. ... security professionals will find value in the authors' formidable understanding of the material. Information Security Magazine 20050101
    Table of contents
    Part I: Introduction to Ethical Disclosure Chapter 1: Ethics of Ethical Hacking Chapter 2: Ethical Hacking and the Legal System Chapter 3: Proper and Ethical Disclosure Part II: Penetration Testing and Tools Chapter 4: Pen-Testing Process Chapter 5: Beyond Hacking Exposed: Advanced Tools for Today's Hacker Chapter 6: Automated Penetration Testing Part III: Exploits Chapter 7: Programming Survival Skills Chapter 8: Basic Linux Exploits Chapter 9: Advance Linux Exploits Chapter 10: Writing Linux Shellcode Chapter 11: Writing a Basic Windows Exploit Part IV: Vulnerability Analysis Chapter 12: Passive Analysis Chapter 13: Advanced Reverse Engineering Chapter 14: From Vulnerability to Exploit Chapter 15: Closing the Holes: Mitigation