Doprava zdarma se Zásilkovnou nad 1 499 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 GLS 54 Kurýr GLS 64 PPL 99 Zásilkovna 54

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Guide to Kernel Exploitation Perla
Libristo kód: 01371048
Nakladatelství Syngress Media,U.S., října 2010
The number of security countermeasures against user-land exploitation is on the rise. Because of thi... Celý popis
? points 119 b
1 193
Skladem u dodavatele Odesíláme za 3-5 dnů

30 dní na vrácení zboží


Mohlo by vás také zajímat


TOP
Hacking: The Art Of Exploitation Jon Erickson / Brožovaná
common.buy 1 126
TOP
Mastering Mountain Bike Skills Brian Lopes / Brožovaná
common.buy 633
TOP
Goddess Love Oracle Wendy Andrews / Karty
common.buy 580
TOP
Rosario+Vampire Complete Box Set Akihisa Ikeda / Brožovaná
common.buy 4 005
TOP
Masters of Street Photography Roberts / Pevná
common.buy 677
TOP
Technical Analysis For Dummies Barbara Rockefeller / Brožovaná
common.buy 691
TOP
Worm at the Core Sheldon Solomon / Brožovaná
common.buy 306
The Empire of Gold S. A. Chakraborty / Brožovaná
common.buy 286
Baby's First Year Journal Annabel Karmel / Pevná
common.buy 276
Hunting Prince Dracula Kerri Maniscalco / Brožovaná
common.buy 296
Assassin's Creed: Awakening Vol. 1 Takeshi Yano / Brožovaná
common.buy 276
Pop Manga Mermaids and Other Sea Creatures Camilla D'Errico / Brožovaná
common.buy 358

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. This title: covers a range of operating system families - UNIX derivatives, Mac OS X, Windows; details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions; and, delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.

Informace o knize

Plný název Guide to Kernel Exploitation
Jazyk Angličtina
Vazba Kniha - Brožovaná
Datum vydání 2010
Počet stran 464
EAN 9781597494861
ISBN 1597494860
Libristo kód 01371048
Nakladatelství Syngress Media,U.S.
Váha 980
Rozměry 192 x 234 x 25
Darujte tuto knihu ještě dnes
Je to snadné
1 Přidejte knihu do košíku a zvolte doručit jako dárek 2 Obratem vám zašleme poukaz 3 Kniha dorazí na adresu obdarovaného

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet