Hacking
Erickson, Jon, 1977-
Hacking the art of exploitation / Jon Erickson. - 2nd ed. - San Francisco, Calif No Starch Press 2008. - x;472 p. illustrations
Includes bibliographical references and index.
1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion.
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.
9781593271442
6271.00
CL0500000020 Safari Books Online 4F68638D-38E2-439E-87DE-641EED535483 OverDrive, Inc. http://www.overdrive.com
2007042910
Computer security.
Hackers.
Computer networks--Security measures.
Computer security.
Computer hackers.
Computer networks--Security measures.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Hackers.
Computer networks--Security measures.
Computer security.
Databrott.
Datasäkerhet.
Electronic books.
Computer network resources.
QA76.9.A25 / E75 2008eb
005.8
Hacking the art of exploitation / Jon Erickson. - 2nd ed. - San Francisco, Calif No Starch Press 2008. - x;472 p. illustrations
Includes bibliographical references and index.
1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion.
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.
9781593271442
6271.00
CL0500000020 Safari Books Online 4F68638D-38E2-439E-87DE-641EED535483 OverDrive, Inc. http://www.overdrive.com
2007042910
Computer security.
Hackers.
Computer networks--Security measures.
Computer security.
Computer hackers.
Computer networks--Security measures.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Hackers.
Computer networks--Security measures.
Computer security.
Databrott.
Datasäkerhet.
Electronic books.
Computer network resources.
QA76.9.A25 / E75 2008eb
005.8