Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Gray Hat Hacking, Second Edition [Format Kindle]

Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness

Prix Kindle : EUR 32,86 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 32,86  
Broché --  
-40%, -50%, -60%, -70%... Découvrez les Soldes Amazon jusqu'au 4 août 2015 inclus. Profitez-en !

Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Présentation de l'éditeur

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group

"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 14851 KB
  • Nombre de pages de l'édition imprimée : 550 pages
  • Utilisation simultanée de l'appareil : Jusqu'à 4 appareils simultanés, selon les limites de l'éditeur
  • Editeur : McGraw-Hill Education; Édition : 2 (10 janvier 2008)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B001G8PNKC
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  •  Souhaitez-vous faire modifier les images ?

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.2 étoiles sur 5  4 commentaires
23 internautes sur 23 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A perfect reference for IT-security consultants 8 juin 2008
Par Henrik Lund Kramshøj - Publié sur Amazon.com
Second edition of books I like are always welcome - and this book is no exception. So I was very happy when I was provided a review copy from the publisher.

I really liked the first edition of this book and consider this follow up an essential book for IT-security consultants and other professionals.

The book is comprised of five parts which each give an overview of important subjects for professional IT-security consultants. Within these five parts are 21 chapters which are mostly around 20 pages, making it possible for busy professionals to digest a chapter while performing the usual projects and everyday work.

The five parts are:
I) introduction to ethical disclosure, including legal system in the US
II) penetration testing tools: metasploit and backtrack
III) exploits 101 with everything from basic programming skills to writing shellcode, but only on Linux and Microsoft Windows.
IV) Vulnerability analysis which is a strong part about static analysis, reverse engineering, fuzzing, writing real life exploits and references to the essential tools used for these purposes
V) Malware analysis is saved for last and includes the finishing touch to why IT-security professionals should care about all the rest of the book

The great thing about this book are that non-programmers are presented with enough materials to get started in finding and developing exploits. This was also the reason why it took so long to do this review. Each time I read a chapter I was itching to get started running the examples and trying the techniques.

Since this book tries to cover a lot of materials they have decided to include references. There are a lot of specific references to full-length articles covering each of the specialized techniques described in the examples. This really works out great, since I can skip the articles I already have read - but get some in-depth materials to complement the book.

As you can probably understand this way of building the book makes it very efficient and much to my liking, I can decide where to go next. The reader can also decide to skip a chapter and enough references to other chapters are provided that I will never get lost. The small price to pay are a few lines repeated in two chapters.

The writing style and the edge of the book is presented with authority and the authors have done a superb job of making this book consistent. The book is written by 4 authors, but except for a few places were they hint to the author of a chapter there are no clues to who wrote what part. The book is overall high quality and I have only discovered two small wording errors.

I have not discovered any problems in the materials presented and was in general amazed by the updates done. As an example they use Vista for some of the Microsoft Windows examples and in other parts they reference articles and techniques that are up to date. When second edition of a book is published the fear is always that only the new chapters are updated, but it seems the book was updated in all chapters.

Some bad things, which are not really that bad are. I would expect more script-languages but for some reason a lot of examples are using C programs for exploits. I personally use Perl for developing scripted exploits, and the book does use that - but in odd places they use C programs.

This is not really wrong, but it feels a bit old'ish. To be fair in some cases the C programs are needed and since the programs that are to be exploited are also C programs, it works out.

The worst thing I can say about the book is that the index is kind of weak. I know specific things are included in the book, but they are nowhere to be found in the index. That does make the book less useful. Others would also think that a book like this should include a CD/DVD - but since everyone can download the tools I would recommended not adding a CD/DVD for the third edition, but use more resources expanding and adding more chapters instead :-)

Target audience
This book is for anyone interested in getting into hacking and developing exploits. While the primary target audience are security professionals I would recommend that some parts are copied and put on the desk of your manager - they really need information about risk, ethical hacking and legal aspects.

As I started out I welcome second editions, and I had high expectations when receiving this book.

I am happy to report that I was satisfied with the results, and even though I got to go through stuff again I was delighted to relearn a lot which I had forgot. Having an updated concise book about exploits with a great number of references written in an easy to follow language is high value for me.

I would suggest that IT-security consulting companies include this book in the welcome package for any new employee who is doing consulting in IT-security - along with a BackTrack CD, laptop, mobile phone and the usual other stuff.

One word of warning, if you own ALL the more specialized books about exploits, shellcode, secure coding, reverse engineering, fuzzing etc. you may want to skip this book. On the other hand you might own all these books, but never found the time to read them cover to cover, then you should read this book :-)

The home page for this book is:

A sample chapter about metasploit is also available on the book website.
5 internautes sur 6 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Perfect! 21 janvier 2010
Par Amazon Customer - Publié sur Amazon.com
Format:Broché|Achat vérifié
In a few words, I loved this book. This book is written in a straightforward manner, right to the point, hands-on exercises and all. The weak points one might find is that it assumes a fair amount of knowledge in the areas of programming (C and python) as well as some networking. I don't think these are real flaws, since this book is directed as hacking (and cracking) in their purest form.
The flaw I would note is that despite having those unsaid requirements, the book tries to appeal to beginners by skipping ahead on the lines of: in the case you're not familiar with C, just copy this example and don't worry about it. For a programmer, this is a waste of time and something which raises suspicion about how serious the authors were. For a beginner, this doesn't help at all. I would rather have a line there saying: read a book on C and come back when you're ready.
But if you're willing to go ahead despite this, you're in for quite a treat.
3.0 étoiles sur 5 Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook 13 février 2010
Par MARMO72 - Publié sur Amazon.com
Format:Broché|Achat vérifié
Close comment
1 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great Book! 3 novembre 2009
Par IT VP - Publié sur Amazon.com
Format:Broché|Achat vérifié
This book is very informative and well worth the reading. Had each of my staff read it and they all got something different out of it.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique