000 04118cam a2200673Ma 4500
001 12633367
003 OSt
005 20190522143813.0
006 m o d
007 cr cn|||||||||
008 071015s2008 caua ob 001 0 eng d
010 _a 2007042910
020 _a9781593271442
024 _c6271.00
035 _a(OCoLC)ocn567957090
035 _a(NNC)12633367
035 _a(OCoLC)567957090
_z(OCoLC)219606838
_z(OCoLC)290537332
_z(OCoLC)475262124
_z(OCoLC)475380402
_z(OCoLC)648357158
_z(OCoLC)716035754
_z(OCoLC)722648316
_z(OCoLC)728035778
_z(OCoLC)765143686
_z(OCoLC)781639618
_z(OCoLC)830164411
_z(OCoLC)961589010
_z(OCoLC)962354774
_z(OCoLC)962561393
_z(OCoLC)968765480
_z(OCoLC)980514065
_z(OCoLC)980855461
_z(OCoLC)985341689
_z(OCoLC)985395995
_z(OCoLC)985480338
_z(OCoLC)988488488
_z(OCoLC)991958215
_z(OCoLC)993587774
_z(OCoLC)993638363
_z(OCoLC)993761221
_z(OCoLC)1010976965
_z(OCoLC)1014366187
_z(OCoLC)1017931369
_z(OCoLC)1020161734
_z(OCoLC)1029496323
_z(OCoLC)1037424331
_z(OCoLC)1037792029
_z(OCoLC)1038688120
_z(OCoLC)1044238063
_z(OCoLC)1048193617
_z(OCoLC)1050970257
_z(OCoLC)1055342695
_z(OCoLC)1055770548
_z(OCoLC)1056323274
_z(OCoLC)1060192887
_z(OCoLC)1060864850
_z(OCoLC)1061003024
037 _aCL0500000020
_bSafari Books Online
037 _a4F68638D-38E2-439E-87DE-641EED535483
_bOverDrive, Inc.
_nhttp://www.overdrive.com
040 _aCCO
_beng
_epn
_cAUI
_dE7B
_dOCLCQ
_dUMI
_dTXJ
_dCEF
_dDKDLA
_dNHM
_dFVL
_dOCLCQ
_dDEBSZ
_dLGG
_dB24X7
_dN$T
_dYDXCP
_dOCLCQ
_dOCLCF
_dOCLCQ
_dOCLCA
_dOCL
_dTEFOD
_dEBLCP
_dTEFOD
_dOCLCQ
_dCOO
_dAZK
_dYDX
_dJBG
_dAGLDB
_dMOR
_dPIFBR
_dZCU
_dMERUC
_dOCLCQ
_dAL5MG
_dCNNOR
_dLOA
_dK6U
_dOCLCA
_dSTF
_dU3W
_dD6H
_dOCLCQ
_dBRL
_dWRM
_dOCLCQ
_dICG
_dVT2
_dCNCEN
_dOCLCQ
049 _aZCUA
050 4 _aQA76.9.A25
_bE75 2008eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
084 _a54.38
_2bcl
084 _aST 277
_2rvk
100 1 _aErickson, Jon,
_d1977-
_93597
245 1 0 _aHacking
_bthe art of exploitation /
_cJon Erickson.
250 _a2nd ed.
260 _aSan Francisco, Calif
_bNo Starch Press
_c2008.
300 _ax;472 p.
_billustrations
504 _aIncludes bibliographical references and index.
505 0 _a1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion.
520 _aHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.
650 0 _aComputer security.
_93598
650 0 _aHackers.
_93599
650 0 _aComputer networks
_xSecurity measures.
_93600
650 7 _aComputer security.
_2blmlsh
_93601
650 7 _aComputer hackers.
_2blmlsh
_93602
650 7 _aComputer networks
_xSecurity measures.
_2blmlsh
_93603
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
_93604
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
_93605
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
_93606
650 7 _aHackers.
_2fast
_93607
650 7 _aComputer networks
_xSecurity measures.
_2fast
_93608
650 7 _aComputer security.
_2fast
_93609
650 7 _aDatabrott.
_2sao
_93610
650 7 _aDatasäkerhet.
_2sao
_93611
655 4 _aElectronic books.
_93612
655 4 _aComputer network resources.
_93613
776 0 8 _iPrint version:
_aErickson, Jon, 1977-
_tHacking.
_b2nd ed.
_dSan Francisco, Calif. : No Starch Press, �2008
_w(DLC) 2007042910
856 4 0 _uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio12633367
_zEbook Central Academic Complete
942 _2ddc
_cBK
990 _aQA
999 _c12614
_d12614