• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Writing security tools and exploits /

پدید آورنده
James C. Foster, Vincent Liu.

موضوع
Computer security, Handbooks, manuals, etc.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

رده
QA76
.
9
.
A25
F67
2006eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0080493130
(Number (ISBN
1423754980
(Number (ISBN
1597499978
(Number (ISBN
9780080493138
(Number (ISBN
9781423754985
(Number (ISBN
9781597499972

NATIONAL BIBLIOGRAPHY NUMBER

Number
b755824

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Writing security tools and exploits /
General Material Designation
[Book]
First Statement of Responsibility
James C. Foster, Vincent Liu.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Rockland, MA :
Name of Publisher, Distributor, etc.
Syngress,
Date of Publication, Distribution, etc.
©2006.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index.
0

SUMMARY OR ABSTRACT

Text of Note
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Elsevier Science & Technology
Stock Number
131902:132009

OTHER EDITION IN ANOTHER MEDIUM

Title
Writing security tools and exploits.
International Standard Book Number
9781597499972

TOPICAL NAME USED AS SUBJECT

Computer security, Handbooks, manuals, etc.
Computer security.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
F67
2006eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Foster, James C.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Liu, Vincent.

ORIGINATING SOURCE

Date of Transaction
20201204160520.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival