Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

  • 8h 44m
  • Daniel Regalado, et al.
  • McGraw-Hill/Osborne
  • 2015
Offering field-tested remedies, case studies, and ready-to-deploy testing labs, this cutting-edge book presents techniques for finding and fixing critical security flaws and explains how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers.