Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 32,39
TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Gray Hat Hacking, Second Edition par [Harris, Shon, Harper, Allen, Eagle, Chris, Ness, Jonathan]
Publicité sur l'appli Kindle

Gray Hat Hacking, Second Edition Format Kindle

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 32,39
"Veuillez réessayer"
EUR 49,44 EUR 6,72

Longueur : 550 pages Optimisé pour de plus grands écrans Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger

il existe une version plus récente pour cet article:

Descriptions du produit

Présentation de l'éditeur

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group

"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 14851 KB
  • Nombre de pages de l'édition imprimée : 550 pages
  • Pagination - ISBN de l'édition imprimée de référence : 0071495681
  • Utilisation simultanée de l'appareil : Jusqu'à 4 appareils simultanés, selon les limites de l'éditeur
  • Editeur : McGraw-Hill Education; Édition : 2 (10 janvier 2008)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B001G8PNKC
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) HASH(0x8e518324) étoiles sur 5 5 commentaires
23 internautes sur 23 ont trouvé ce commentaire utile 
HASH(0x89e72864) étoiles sur 5 A perfect reference for IT-security consultants 8 juin 2008
Par Henrik Lund Kramshøj - Publié sur
Format: Broché
Second edition of books I like are always welcome - and this book is no exception. So I was very happy when I was provided a review copy from the publisher.

I really liked the first edition of this book and consider this follow up an essential book for IT-security consultants and other professionals.

The book is comprised of five parts which each give an overview of important subjects for professional IT-security consultants. Within these five parts are 21 chapters which are mostly around 20 pages, making it possible for busy professionals to digest a chapter while performing the usual projects and everyday work.

The five parts are:
I) introduction to ethical disclosure, including legal system in the US
II) penetration testing tools: metasploit and backtrack
III) exploits 101 with everything from basic programming skills to writing shellcode, but only on Linux and Microsoft Windows.
IV) Vulnerability analysis which is a strong part about static analysis, reverse engineering, fuzzing, writing real life exploits and references to the essential tools used for these purposes
V) Malware analysis is saved for last and includes the finishing touch to why IT-security professionals should care about all the rest of the book

The great thing about this book are that non-programmers are presented with enough materials to get started in finding and developing exploits. This was also the reason why it took so long to do this review. Each time I read a chapter I was itching to get started running the examples and trying the techniques.

Since this book tries to cover a lot of materials they have decided to include references. There are a lot of specific references to full-length articles covering each of the specialized techniques described in the examples. This really works out great, since I can skip the articles I already have read - but get some in-depth materials to complement the book.

As you can probably understand this way of building the book makes it very efficient and much to my liking, I can decide where to go next. The reader can also decide to skip a chapter and enough references to other chapters are provided that I will never get lost. The small price to pay are a few lines repeated in two chapters.

The writing style and the edge of the book is presented with authority and the authors have done a superb job of making this book consistent. The book is written by 4 authors, but except for a few places were they hint to the author of a chapter there are no clues to who wrote what part. The book is overall high quality and I have only discovered two small wording errors.

I have not discovered any problems in the materials presented and was in general amazed by the updates done. As an example they use Vista for some of the Microsoft Windows examples and in other parts they reference articles and techniques that are up to date. When second edition of a book is published the fear is always that only the new chapters are updated, but it seems the book was updated in all chapters.

Some bad things, which are not really that bad are. I would expect more script-languages but for some reason a lot of examples are using C programs for exploits. I personally use Perl for developing scripted exploits, and the book does use that - but in odd places they use C programs.

This is not really wrong, but it feels a bit old'ish. To be fair in some cases the C programs are needed and since the programs that are to be exploited are also C programs, it works out.

The worst thing I can say about the book is that the index is kind of weak. I know specific things are included in the book, but they are nowhere to be found in the index. That does make the book less useful. Others would also think that a book like this should include a CD/DVD - but since everyone can download the tools I would recommended not adding a CD/DVD for the third edition, but use more resources expanding and adding more chapters instead :-)

Target audience
This book is for anyone interested in getting into hacking and developing exploits. While the primary target audience are security professionals I would recommend that some parts are copied and put on the desk of your manager - they really need information about risk, ethical hacking and legal aspects.

As I started out I welcome second editions, and I had high expectations when receiving this book.

I am happy to report that I was satisfied with the results, and even though I got to go through stuff again I was delighted to relearn a lot which I had forgot. Having an updated concise book about exploits with a great number of references written in an easy to follow language is high value for me.

I would suggest that IT-security consulting companies include this book in the welcome package for any new employee who is doing consulting in IT-security - along with a BackTrack CD, laptop, mobile phone and the usual other stuff.

One word of warning, if you own ALL the more specialized books about exploits, shellcode, secure coding, reverse engineering, fuzzing etc. you may want to skip this book. On the other hand you might own all these books, but never found the time to read them cover to cover, then you should read this book :-)

The home page for this book is:

A sample chapter about metasploit is also available on the book website.
5 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x89d9215c) étoiles sur 5 Perfect! 21 janvier 2010
Par Andrew - Publié sur
Format: Broché Achat vérifié
In a few words, I loved this book. This book is written in a straightforward manner, right to the point, hands-on exercises and all. The weak points one might find is that it assumes a fair amount of knowledge in the areas of programming (C and python) as well as some networking. I don't think these are real flaws, since this book is directed as hacking (and cracking) in their purest form.
The flaw I would note is that despite having those unsaid requirements, the book tries to appeal to beginners by skipping ahead on the lines of: in the case you're not familiar with C, just copy this example and don't worry about it. For a programmer, this is a waste of time and something which raises suspicion about how serious the authors were. For a beginner, this doesn't help at all. I would rather have a line there saying: read a book on C and come back when you're ready.
But if you're willing to go ahead despite this, you're in for quite a treat.
HASH(0x89be7828) étoiles sur 5 Good content. May be a bit outdated now 19 octobre 2015
Par alne - Publié sur
Format: Broché Achat vérifié
Good content. May be a bit outdated now. But it's not as thorough as I'd like. More about tools than concepts.
HASH(0x89be5c6c) étoiles sur 5 Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook 13 février 2010
Par MARMO72 - Publié sur
Format: Broché Achat vérifié
Close comment
1 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x89ff8c60) étoiles sur 5 Great Book! 3 novembre 2009
Par IT VP - Publié sur
Format: Broché Achat vérifié
This book is very informative and well worth the reading. Had each of my staff read it and they all got something different out of it.
Ces commentaires ont-ils été utiles ? Dites-le-nous