• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
The shellcoder's handbook :

پدید آورنده
Chris Anley [and others].

موضوع
Computer security.,Data protection.,Risk assessment.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Risk assessment.

رده
QA76
.
9
.
A25
S464
2007eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0470198826
(Number (ISBN
9780470198827
Erroneous ISBN
047008023X
Erroneous ISBN
9780470080238

NATIONAL BIBLIOGRAPHY NUMBER

Number
b792710

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
The shellcoder's handbook :
General Material Designation
[Book]
Other Title Information
discovering and exploiting security holes /
First Statement of Responsibility
Chris Anley [and others].

EDITION STATEMENT

Edition Statement
2nd ed.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Indianapolis, IN :
Name of Publisher, Distributor, etc.
Wiley Pub.,
Date of Publication, Distribution, etc.
©2007.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xxiv, 718 pages) :
Other Physical Details
illustrations

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.
0

SUMMARY OR ABSTRACT

Text of Note
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable co.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Safari Books Online
Stock Number
CL0500000099

OTHER EDITION IN ANOTHER MEDIUM

Title
Shellcoder's handbook.
International Standard Book Number
047008023X

TOPICAL NAME USED AS SUBJECT

Computer security.
Data protection.
Risk assessment.
Computer security.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
Data protection.
Risk assessment.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
S464
2007eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Anley, Chris.
Koziol, Jack.

ORIGINATING SOURCE

Date of Transaction
20201207055745.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival