Paperback: 656 pages
Publisher: McGraw-Hill Education; 4 edition (January 5, 2015)
Language: English
ISBN-10: 0071832386
ISBN-13: 978-0071832380
Product Dimensions: 7.4 x 1.5 x 9.1 inches
Shipping Weight: 1.9 pounds (View shipping rates and policies)
Average Customer Review: 4.5 out of 5 stars See all reviews (24 customer reviews)
Best Sellers Rank: #67,118 in Books (See Top 100 in Books) #21 in Books > Computers & Technology > Security & Encryption > Encryption #23 in Books > Computers & Technology > Security & Encryption > Cryptography #28 in Books > Computers & Technology > Security & Encryption > Viruses
Excellent overview of how an ethical hacker should proceed with his/her work. Clear, detailed explanation of how to proceed through many stages of hacking and how far the gray hat hacker should go in order to fulfill his/her statement of work. A proactive approach to finding weaknesses in systems is well-explained, in combination with suggestions for the company to proceed to find those errors. Other books on malware are excellent as well, but are more reactive in their approach.
Well, the book is very good,but I believe that the first 55 pages Chapters 1 and 2 are useless for a beginner because it does not teach C, ASM, or Python - (for these skills I recommend the books The Art of Assembly Language, Python Cookbook, Third edition and Black Hat Python: Python Programming for Hackers and Pentesters - excellent), the chapters 1 and 2 give a very basic explanation of languages, these pages are also useless for an experienced User seeking challenges and new, the exercises of laboratory listed in the appendix of the book, are now available in the mcgraw professional download site.The other 500 pages of the book are a wonderful contribution of the authors to us hobbyists, professionals, curious and hackers.The cover is nice and well finished, has colors and a varnish that leaves very beautiful, the pages are excellent for reading and handling, have about 90% opacity, are White and firm, I believe the weight is between 65g to 70g.
It's an excellent book for CISSP candidates to have a very high level idea of hacking techniques. For anyone trying to apply their hacking instincts in the digital realm, this is at best a compilation of notes someone would take about secure coding while in CS courses (if any Higher Ed. began incorporating secure coding to their curriculum) or independent studies. If you learned to program from security conscious authors, usually non-textbook authors, you will be very disappointed and should not need this book. It would have also been good to provide the source code for find.c on a single page. I guess the author didn't intend for the readers to follow along; typical CISSP or script kiddy manager/"pentester" approach of reading quickly without committing techniques to memory.
Great book, I currently reference this book with my current job. It goes into just enough detail to cover the concepts. Then you're able to decide what you wnt to dive into with other publications.
Hi. Actually i found this book very helpful and discuss important case's
Amazing Book filled with easy to follow but in depth examples.
Very good book, Good for beginners and seasons programmers.
Great reference book - bought it for class.
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Hacking: The Ultimate Beginners Guide (Computer Hacking, Hacking and Penetration, Hacking for dummies, Basic security Coding and Hacking) (Hacking and Coding Book 1) Hacking University: Freshman Edition Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beginners, Computer ... (Hacking Freedom and Data Driven Book 1) Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking) Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and ... (Hacking Freedom and Data Driven Book 2) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) HACKING: Learn Hacking FAST! Ultimate Course Book For Beginners (computer hacking, programming languages, hacking for dummies) Hacking: Wireless Hacking, How to Hack Wireless Networks, A Step-by-Step Guide for Beginners (How to Hack, Wireless Hacking, Penetration Testing, Social ... Security, Computer Hacking, Kali Linux) Hacking: The Ultimate Beginners Guide (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, Basic Security) Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) Hacking: Tapping into the Matrix Tips, Secrets, steps, hints, and hidden traps to hacking: Hacker, Computer, Programming, Security & Encryption Hacking: Ultimate Guide to Ethical Hacking for Beginners The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a Hacking GENIUS Hacking: How to Computer Hack: An Ultimate Beginner's Guide to Hacking (Programming, Penetration Testing, Network Security) (Cyber Hacking with Virus, Malware and Trojan Testing) Wireless Hacking: How To Hack Wireless Network (How to Hack, Wireless Hacking, Penetration Testing, Social ... Security, Computer Hacking, Kali Linux) C++: C++ and Hacking for dummies. A smart way to learn C plus plus and beginners guide to computer hacking (C++ programming, C++ for Beginners, hacking, ... language, coding, web developing Book 2) The Hacker's Briefcase (Hacker Magazine Book 1)