Amazon cover image
Image from Amazon.com

Hacking the art of exploitation / Jon Erickson.

By: Material type: TextTextPublication details: San Francisco, Calif No Starch Press 2008.Edition: 2nd edDescription: x;472 p. illustrationsISBN:
  • 9781593271442
Subject(s): Genre/Form: Additional physical formats: Print version:: Hacking.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 E75 2008eb
Other classification:
  • 54.38
  • ST 277
Online resources:
Contents:
1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion.
Summary: Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Book Book Air University Central Library Islamabad Computer Science 005.8 Er41H (Browse shelf(Opens below)) Available P12902

Includes bibliographical references and index.

1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion.

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.

There are no comments on this title.

to post a comment.
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631