Hi all, Continuing from IronGeek's this thread I would like inform all you guys/gals, Hacking Exposed 5th has been released today. Here's the "Whats new" from the book.

We continue to update Hacking Exposed because new technologies are being developed continually that introduce new security exposures. In essence, the security world and its associated challenges parallel the rate of technology change. That is, as the complexity of technology increases at an exponential rate, so do the security challenges. This is both good news and bad news depending on what side of the fence you sit on. In addition, new techniques, tools, and attack vectors used to circumvent existing security technologies are being developed at a mind-numbing rate. You could say it is the proverbial cat and mouse game; however, the stakes are very real. In this fifth edition, we have worked tirelessly to update this venerable tome to cover the latest technologies and provide you with the latest techniques.

New Content
Among the new items exposed in the fifth edition:
» Up-to-date techniques and countermeasures for preventing the exploitation of
UNIX systems

» New chapter on “Hacking Code” covering the ways flaws get introduced into
software and how best to prevent their ubiquitous spread

» New Windows hacks, including RPCSS (Blaster), LSASS (Sasser), and PCT
(Download.ject) buffer overflow exploits

» Updated denial of service chapter with from-the-trenches descriptions of large
scale zombie attacks and practical countermeasures

» Coverage of new web hacking tools and techniques including HTTP response
splitting and automated vulnerability scanners

» Totally revised chapter on “Hacking Internet Users” covering the newest IE
exploits, online services security, socio-technical attacks like phishing, and the
newest malware techniques including Windows rootkits techniques

» Coverage of new wireless hacks

» New content on remote connectivity including VoIP hacking

» New coverage of web and e-mail client hacking, including the latest
Internet Explorer exploits, phishing, spyware, rootkits, and bots

» New hacks using Google as a reconnaissance tool

» An updated footprinting chapter that deals with all the inevitable changes
in finding information from various Internet databases

» Brand new case studies covering relevant and timely security attacks,
including Google, wireless, and Mac OS X hacks
Source : http://shop.osborne.com/cgi-bin/osborne/0072260815.html

grab your copy now!!

Note: It may or may not be available on stores like Amazon or Ebay but you can order it on Osborne website(link above).

- :Singh: