Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title The shellcoder's handbook : discovering and exploiting security holes / Chris Anley [and others]. [O'Reilly electronic resource]

Edition 2nd ed.
Imprint Indianapolis, IN : Wiley Pub., ©2007.
QR Code
Description 1 online resource (xxiv, 718 pages) : illustrations
text file
Bibliography Includes bibliographical references and index.
Summary This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable co
Contents Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.
Subject Computer security.
Data protection.
Risk assessment.
Computer Security
Risk Assessment
Sécurité informatique.
Protection de l'information (Informatique)
Évaluation du risque.
risk assessment.
Computer security
Data protection
Risk assessment
Genre Electronic book.
Added Author Anley, Chris.
Koziol, Jack. Shellcoder's handbook.
Other Form: Print version: Shellcoder's handbook. 2nd ed. Indianapolis, IN : Wiley Pub., ©2007 9780470080238 047008023X (DLC) 2007021079 (OCoLC)72868228
ISBN 9780470198827 (electronic bk.)
0470198826 (electronic bk.)
Standard No. 9780470080238
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information