• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
The shellcoder's handbook : discovering and exploiting security holes

پدید آورنده
Chris Anley ... ]et al.[

موضوع
، Computer security,، Data protection,، Risk assessment

رده
QA
76
.
9
.
A25
S464
2007

کتابخانه
Library of Razi Metallurgical Research Center

محل استقرار
استان: Tehran ـ شهر: Tehran

Library of Razi Metallurgical Research Center

تماس با کتابخانه : 46831570-021

OTHER STANDARD IDENTIFIER

Standard Number
electronic

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
The shellcoder's handbook : discovering and exploiting security holes

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Indianapolis, IN
Name of Publisher, Distributor, etc.
Wiley Pub.
Date of Publication, Distribution, etc.
2007

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xxiv, 718 p. : ill. ; 24 cm

GENERAL NOTES

Text of Note
Includes index
Text of Note
"The shellcoder's handbook : discovering and exploiting security holes )1st edition( was written by Jack Koziol ... ]et al.[."

NOTES PERTAINING TO TITLE AND STATEMENT OF RESPONSIBILITY

Text of Note
Chris Anley ... ]et al.[

NOTES PERTAINING TO EDITION AND BIBLIOGRAPHIC HISTORY

Text of Note
2nd ed

NOTES PERTAINING TO SUBJECT ACCESS

Text of Note
R

CONTENTS NOTE

Text of Note
Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel

TOPICAL NAME USED AS SUBJECT

Entry Element
، Computer security
Entry Element
، Data protection
Entry Element
، Risk assessment

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA
76
.
9
.
A25
S464
2007

PERSONAL NAME - PRIMARY RESPONSIBILITY

Relator Code
TI

AU Anley, Chris
AT Shellcoder's handbook Koziol, Jack

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival