Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
Build and launch spoofing exploits with Ettercap and Evilgrade
Induce error conditions and crash software using fuzzers
Hack Cisco routers, switches, and network hardware
Use advanced reverse engineering to exploit Windows and Linux software
Bypass Windows Access Control and memory protection schemes
Scan for flaws in Web applications using Fiddler and the x5 plugin
Learn the use-after-free technique used in recent zero days
Bypass Web authentication via MySQL type conversion and MD5 injection attacks
Inject your shellcode into a browser's memory using the latest Heap Spray techniques
Hijack Web browsers with Metasploit and the BeEF Injection Framework
Neutralize ransomware before it takes control of your desktop
Dissect Android malware with JEB and DAD decompilers
Find one-day vulnerabilities with binary diffing
Professional NFC Application Development for Android
A practical guide to developing and deploying Near Field Communication (NFC) applications
There has been little practical guidance available on NFC programming, until now. If you're a programmer or developer, get this unique and detailed book and start creating apps for this exciting technology. NFC enables contactless...
Digital Image Processing (2nd Edition) Interest in digital image processing methods stems from two principal application
areas: improvement of pictorial information for human interpretation; and
processing of image data for storage, transmission, and representation for autonomous
machine perception.This chapter has several objectives: (1) to define
the scope of the...
Enterprise AJAX: Strategies for Building High Performance Web Applications If you are like many of the talented developers we meet, you’re interested in AJAX and how you can use it to improve your web applications. You may have even done some preliminary research online, checked out Ajaxian.com, or read a beginner’s book to AJAX development. If not, then you’re like an even larger group of talented...
The McGraw-Hill 36-Hour Course: Online Marketing (McGraw-Hill 36-Hour Courses)
The McGraw-Hill 36-Hour Course: Online Marketing is a book
that will teach you about online marketing tools and how to apply
them to support marketing credibility, visibility, and sellability.
This book is written for students, entrepreneurs, marketers, and
professionals—in short, anyone who wants to understand the art
Pro OpenGL ES for Android
In 1985 I brought home a new shiny Commodore Amiga 1000, about one week after
they were released. Coming with a whopping 512K of memory, programmable
colormaps, a Motorola 68K CPU, and a modern multitasking operating system, it had
“awesome” writ all over it. Metaphorically speaking, of course. I thought it might