|Listed in category:
Bidding ended on Sat, 27 Apr at 3:09 AM.
Have one to sell?

Signed Copy Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition

Condition:
Like New
Ended: 28 Apr, 2024 03:09:33 BST
Starting bid:
US $4.00
[ ]
ApproximatelyEUR 3.71
[ ]
Postage:
US $5.61 (approx EUR 5.21) Economy P&P. See detailsfor postage
Located in: Oroville, California, United States
Delivery:
Estimated between Thu, 9 May and Mon, 13 May to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the delivery service selected, the seller's delivery history and other factors. Delivery times may vary, especially during peak periods.
Returns:
14 days return. Buyer pays for return postage. See details- for more information about returns
Payments:
    

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Registered as private seller, so consumer rights stemming from EU consumer protection law do not apply. eBay Money Back Guarantee still applies to most purchases.
Seller assumes all responsibility for this listing.
eBay item number:305523011042

Item specifics

Condition
Like New: A book that has been read, but looks new. The book cover has no visible wear, and the dust ...
ISBN
9780071832380
Publication Year
2015
Type
Textbook
Format
Trade Paperback
Language
English
Publication Name
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Item Height
1.3in
Author
Shon Harris, Allen Harper, Jonathan Ness, Chris Eagle, Daniel Regalado
Item Length
9in
Publisher
Mcgraw-Hill Education
Item Width
7.3in
Item Weight
33.2 Oz
Number of Pages
656 Pages

About this product

Product Information

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing "

Product Identifiers

Publisher
Mcgraw-Hill Education
ISBN-10
0071832386
ISBN-13
9780071832380
eBay Product ID (ePID)
201641310

Product Key Features

Author
Shon Harris, Allen Harper, Jonathan Ness, Chris Eagle, Daniel Regalado
Publication Name
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition
Format
Trade Paperback
Language
English
Publication Year
2015
Type
Textbook
Number of Pages
656 Pages

Dimensions

Item Length
9in
Item Height
1.3in
Item Width
7.3in
Item Weight
33.2 Oz

Additional Product Features

Lc Classification Number
Qa76.9.A25
Edition Number
4
Table of Content
Part I:Law & Ethics1: Ethical Hacking and the Legal SystemPart II: Crash Course: Preparing for the War2 Programming Survival Skill3 Passive Analysis4 Advanced Reverse Engineering with IDA Pro 5 Intelligent Fuzzing 6 Shellcode Strategies7 Writing Linux ShellcodePart III: From Vulnerability to Exploit8: Spoofing Based Attacks9: Exploiting Cisco Routers 10: Basic Linux Exports 11: Advanced Linux Exploits 12: Bypassing Windows Memory Protections 13: Exploiting the Windows Access Control Model 14: Exploiting Web Applications 15: Bypassing Adobe Sandbox 16: Client-Side Browser Exploits17: Exploiting Mobile Devices Part IV: Automated Exploitation18: Advanced Client-side Exploitation with BeEF19: Metasploit to the Next Level20: Commercial Exploit Frameworks AnalysisPart V: Advanced Malware Analysis21: Dissecting Stuxnet22: Dissecting Android Malware23: Dissecting Blackhole Exploit Kit24: Analyzing 64-bit Malware25: Dissecting Kernel-mode Rootkit
Copyright Date
2015
Target Audience
Trade
Topic
Networking / General, Security / General, General, Référence
Dewey Decimal
005.8
Dewey Edition
23
Illustrated
Yes
Genre
Computers

Item description from the seller

RollnPC

RollnPC

100% positive Feedback
7.9K items sold
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months

Accurate description
5.0
Reasonable postage cost
4.9
Delivery time
5.0
Communication
5.0
Registered as a private seller
Thereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.

Seller Feedback (4,037)

k***e (229)- Feedback left by buyer.
Past month
Verified purchase
Great seller. Shipping and packaging great.
a***a (891)- Feedback left by buyer.
Past month
Verified purchase
Thanks
b***o (3328)- Feedback left by buyer.
Past month
Verified purchase
Thank You! AAA+++