Shellcoders Handbook Discovering and Exploiting Security Holes

Afbeeldingen

Artikel vergelijken

  • Engels
  • Paperback
  • 9780470080238
  • 10 augustus 2007
  • 744 pagina's
Alle productspecificaties

Samenvatting

Since 2004, built-in security measures on compilers and operating systems have become commonplace. The black hats have kept up with security enhancements. Have you?

The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution vulnerabilities still allow attackers to run code of their choice on your system—with disastrous results.

In a nutshell, this book is about code and data and what happens when the two become confused. You'll work with the basic building blocks of security bugs—assembler, source code, the stack, the heap, and so on. You'll experiment, explore, and understand the systems you're running—and how to better protect them.

  • Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco's IOS
  • Learn how to write customized tools to protect your systems, not just how to use ready-made ones

  • Use a working exploit to verify your assessment when auditing a network

  • Use proof-of-concept exploits to rate the significance of bugs in software you're developing

  • Assess the quality of purchased security products by performing penetration tests based on the information in this book

  • Understand how bugs are found and how exploits work at the lowest level



  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
  • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
  • The companion Web site features downloadable code files

Productspecificaties

Inhoud

Taal
en
Bindwijze
Paperback
Oorspronkelijke releasedatum
10 augustus 2007
Aantal pagina's
744
Illustraties
Nee

Betrokkenen

Hoofdauteur
Jack Koziol
Tweede Auteur
John Heasman
Co Auteur
Dave Aitel
Hoofduitgeverij
WILQ

Overige kenmerken

Editie
2
Extra groot lettertype
Nee
Product breedte
188 mm
Product hoogte
41 mm
Product lengte
231 mm
Studieboek
Nee
Verpakking breedte
189 mm
Verpakking hoogte
40 mm
Verpakking lengte
235 mm
Verpakkingsgewicht
1283 g

EAN

EAN
9780470080238

Je vindt dit artikel in

Taal
Engels
Beschikbaarheid
Leverbaar
Boek, ebook of luisterboek?
Boek
Studieboek of algemeen
Algemene boeken
Nog geen reviews

Kies gewenste uitvoering

Bindwijze : Paperback

Prijsinformatie en bestellen

De prijs van dit product is 38 euro en 63 cent.
Uiterlijk 10 mei in huis
Verkoop door bol
  • Prijs inclusief verzendkosten, verstuurd door bol
  • Ophalen bij een bol afhaalpunt mogelijk
  • 30 dagen bedenktijd en gratis retourneren
  • Dag en nacht klantenservice

Vaak samen gekocht

Lijst met gekozen artikelen om te vergelijken

Vergelijk artikelen