رکورد قبلیرکورد بعدی

" The shellcoder's handbook : "


Document Type : BL
Record Number : 1038340
Doc. No : b792710
Title & Author : The shellcoder's handbook : : discovering and exploiting security holes /\ Chris Anley [and others].
Edition Statement : 2nd ed.
Publication Statement : Indianapolis, IN :: Wiley Pub.,, ©2007.
Page. NO : 1 online resource (xxiv, 718 pages) :: illustrations
ISBN : 0470198826
: : 9780470198827
: 047008023X
: 9780470080238
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.
Abstract : This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable co.
Subject : Computer security.
Subject : Data protection.
Subject : Risk assessment.
Subject : Computer security.
Subject : COMPUTERS-- Internet-- Security.
Subject : COMPUTERS-- Networking-- Security.
Subject : COMPUTERS-- Security-- General.
Subject : Data protection.
Subject : Risk assessment.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭S464 2007eb‬
Added Entry : Anley, Chris.
: Koziol, Jack.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟