McGraw-Hill Education | Gray Hat Hacking: The Ethical Hacker's Handbook, 6th Edition (2022 EN)

Discussion in 'Computing' started by Kanka, Mar 5, 2022.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,086
    Likes Received:
    446
    Trophy Points:
    83
    [​IMG]

    Author: Allen Harper (Author), Ryan Linn (Author), Stephen Sims (Author), Michael Baucom (Author), Huascar Tejeda (Author), Daniel Fernandez (Author), Moses Frost (Author)
    Full Title: Gray Hat Hacking: The Ethical Hacker's Handbook, 6th Edition
    Publisher: McGraw-Hill Education; 6th edition (March 14, 2022)
    Year: 2022
    ISBN-13: 9781264268955 (978-1-26-426895-5), 9781264268948 (978-1-264-26894-8)
    ISBN-10: 1264268955, 1264268947
    Pages: 704
    Language: English
    Genre: Educational: Networking
    File type: EPUB (True)
    Quality: 10/10
    Price: $60.00


    Up-to-date strategies for thwarting the latest, most insidious network attacks.

    This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.

    Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained.

    ✓ Fully revised content includes 7 new chapters covering the latest threats
    ✓ Includes proof-of-concept code stored on the GitHub repository
    ✓ Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides

    -------------