Gray Hat Hacking: The Ethical Hacker's Handbook
β Scribed by Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams
- Publisher
- McGraw-Hill Prof Med/Tech
- Year
- 2011
- Tongue
- English
- Leaves
- 721
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
About the Author Allen Harper, CISSP, a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC. Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Forceβs Information Warfare unit, an instructor, and a bestselling author. She was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. Jonathan Ness is a software security engineer at Microsoft. He is a member of an Air National Guard unit where he leads network penetration tests against military facilities across the country and helps define the information warfare aggressor mission for the Air Force. Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California. A computer engineer/scientist for 25 years, his research interests include computer network attack and defense, computer forensics, and reverse/anti-reverse engineering. He can often be found teaching at Black Hat or spending late nights working on capture the flag at Defcon Gideon J. Lenkey, CISSP co-founded Ra Security Systems, a network security monitoring and consultancy. He has provided advanced training to the FBI and is the sitting president of the FBI's InfraGard chapter in New Jersey. Terron Williams, NSA IAM-IEM, CEH, CSSLP, works for Elster Electricity as a Senior Test Engineer with his primary focus on Smart Grid Security. He has served on the editorial board for Hakin9 Magazine.
π SIMILAR VOLUMES
<p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span></span>authenticity, or access to any online entitlements included with the product.</b></p><p><b><br></b></p><p><b>Cutting-edge techniques for finding and fixing critical secur
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors a
<h4>THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS</h4> <p>Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, <i>Gray Hat Hacking: The Ethical Hacker's Handbook</i>, Thir
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hackerβs Handbook, Fifth Edition explains the enemyβs current weapons, skills, and tactics and offers field-teste