Ethisches Hacking: Eine praktische Einführung in das Einbrechen

dealallday8
(458)
Angemeldet als gewerblicher Verkäufer
US $34,99
Ca.CHF 28,06
oder Preisvorschlag
Artikelzustand:
Gut
Ganz entspannt. Kostenloser Rückversand.
Schnell, bevor er weg ist. 1 Person beobachtet diesen Artikel.
Versand:
US $5,22 (ca. CHF 4,19) USPS Media MailTM.
Standort: Columbia, Missouri, USA
Lieferung:
Lieferung zwischen Mi, 15. Okt und Di, 21. Okt nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:186391108595

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Subject
Ethics
ISBN
9781718501874
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1718501870
ISBN-13
9781718501874
eBay Product ID (ePID)
9050389924

Product Key Features

Number of Pages
376 Pages
Language
English
Publication Name
Ethical Hacking : a Hands-On Introduction to Breaking in
Subject
Engineering (General), Security / Online Safety & Privacy, Security / Networking, Programming Languages / Python
Publication Year
2021
Type
Textbook
Subject Area
Computers, Technology & Engineering
Author
Daniel G. Graham
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
25.8 Oz
Item Length
9.3 in
Item Width
7 in

Additional Product Features

Intended Audience
Trade
LCCN
2021-940441
Reviews
" Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator " Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is on my list for book recommendations for those interested and new to cyber. Very well detailed and simple enough for most to understand. Another great book published by No Starch Press." --Jered Bare, @jeredbare " Ethical Hacking is filled with great exercises that give you a much deeper understanding of important, complicated topics by having you go through the details of implementation. Making deep fakes, implementing a botnet and other topics are enlightening, lots of fun and will help you defend against these threats, possibly by also helping you find bugs and issues which can disable them!" --Jamie G., Advanced Reviewer "Good for beginners in cybersecurity, ethical hacking and offensive security. . . . 4.5 / 5.0" --Uday Mittal, Cybersecurity Professional, " Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator, " Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator " Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is on my list for book recommendations for those interested and new to cyber. Very well detailed and simple enough for most to understand. Another great book published by No Starch Press." --Jered Bare, @jeredbare " Ethical Hacking is filled with great exercises that give you a much deeper understanding of important, complicated topics by having you go through the details of implementation. Making deep fakes, implementing a botnet and other topics are enlightening, lots of fun and will help you defend against these threats, possibly by also helping you find bugs and issues which can disable them!" --Jamie G., Advanced Reviewer
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Synopsis
Ethical Hacking is a crash course in modern hacking techniques. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin by capturing a victim's network traffic with an ARP spoofing attack and then view the packet capture in Wireshark. Next, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and craft fake emails like the ones used in phishing attacks. You'll also learn how to fuzz software for new vulnerabilities, create trojans and rootkits, exploit websites with SOL injection, and escalate your privileges in order to extract credentials to traverse a private network. Along the way, you'll work with a wide range of professional pentesting tools (such as the Metasploit Framework, mimikatz, and BeEF), discover how advanced fuzzers work behind the scenes, see how internet traffic gets encrypted, and explore the inner mechanisms of nation-state malware like Drovorub. You'll also learn how to: Execute cross-site scripting attack to deliver sophisticated JavaScript payloads, Write your own hacking tools in Python, Capture passwords in a corporate Windows network, Scan countless devices on the internet to find potential victims, Install Linux rootkits that modify a victim's operating system, Ethical Hacking addresses modern cybersecurity issues and teaches you the fundamental skills you need to become an ethical hacker. Take the first step in your pentesting career by learning how the experts break in. Book jacket., A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics- capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools-and learn to write your own tools in Python-as you practice tasks like- Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victim's operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker- someone who can carefully analyze systems and creatively gain access to them., A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools--and learn to write your own tools in Python--as you practice tasks like: Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victim's operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker someone who can carefully analyze systems and creatively gain access to them.
LC Classification Number
TK5105.59

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

dealallday8

100% positive Bewertungen809 Artikel verkauft

Mitglied seit Jan 1999
Antwortet meist innerhalb 24 Stunden
Angemeldet als gewerblicher Verkäufer

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
4.6
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (263)

Alle Bewertungenselected
Positiv
Neutral
Negativ