Bild 1 von 1

Galerie
Bild 1 von 1

The Shellcoder's Handbook: Entdecken und Ausnutzen von Sicherheitslöchern-
by Koziol, Jack; Litchfield,... | PB | Acceptable
US $6,55
Ca.EUR 5,62
Artikelzustand:
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ”... Mehr erfahrenÜber den Artikelzustand
Akzeptabel
Buch mit deutlichen Gebrauchsspuren. Der Einband kann einige Beschädigungen aufweisen, ist aber in seiner Gesamtheit noch intakt. Die Bindung ist möglicherweise leicht beschädigt, in ihrer Gesamtheit aber noch intakt. In den Randbereichen wurden evtl. Notizen gemacht, der Text kann Unterstreichungen und Markierungen enthalten, es fehlen aber keine Seiten und es ist alles vorhanden, was für die Lesbarkeit oder das Verständnis des Textes notwendig ist. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
3 verfügbar1 verkauft
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Economy Shipping.
Lieferung zwischen Mo, 25. Aug und Fr, 29. Aug nach 94104 bei heutigem Zahlungseingang
Standort: Aurora, Illinois, USA
Rücknahme:
30 Tage Rückgabe. Kostenloser Rückversand.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:146241410318
Artikelmerkmale
- Artikelzustand
- Akzeptabel
- Hinweise des Verkäufers
- Binding
- Paperback
- Book Title
- The Shellcoder's Handbook
- Weight
- 2 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9780764544682
Über dieses Produkt
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0764544683
ISBN-13
9780764544682
eBay Product ID (ePID)
5960347
Product Key Features
Number of Pages
644 Pages
Publication Name
Shellcoder's Handbook : Discovering and Exploiting Security Holes
Language
English
Publication Year
2004
Subject
Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.4 in
Item Weight
34.3 Oz
Item Length
9.3 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
LCCN
2003-027629
Reviews
"...80%...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed..." ( PC Utilities , July 2004) "...essential for administrators who want to secure computer systems under their management..." ( Computer Weekly , March 2004) "...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
TitleLeading
The
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
About the Authors.Credits.Acknowledgments.Part 1: Introduction to Exploitation: Linux on x86.Chapter 1: Before You Begin.Chapter 2: Stack Overflows.Chapter 3: Shellcode.Chapter 4: Introduction to Format String Bugs.Chapter 5: Introduction to Heap Overflows.Part 2: Exploiting More Platforms: Windows, Solaris, and Tru64.Chapter 6: The Wild World of Windows.Chapter 7: Windows Shellcode.Chapter 8: Windows Overflows.Chapter 9: Overcoming Filters.Chapter 10: Introduction to Solaris Exploitation.Chapter 11: Advanced Solaris Exploitation.Chapter 12: HP Tru64 Unix Exploitation.Part 3: Vulnerability Discovery.Chapter 13: Establishing a Working Environment.Chapter 14: Fault Injection.Chapter 15: The Art of Fuzzing.Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages.Chapter 17: Instrumented Investigation: A Manual Approach.Chapter 18: Tracing for Vulnerabilities.Chapter 19: Binary Auditing: Hacking Closed Source Software.Part 4: Advanced Materials.Chapter 20: Alternative Payload Strategies.Chapter 21: Writing Exploits that Work in the Wild.Chapter 22: Attacking Database Software.Chapter 23: Kernel Overflows.Chapter 24: Exploiting Kernel Vulnerabilities.Index.
Synopsis
Uncover, exploit, and close security holes in any software or operating systemEvery day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, youa'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed."The Shellcodera's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows r , Linux r , and Solaris TM ) and applications (including MS SQL Server and Oracle r databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniques, Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
LC Classification Number
QA76.9.A25
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
ThriftBooks
98,9% positive Bewertungen•19,8 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Beliebte Kategorien in diesem Shop
Verkäuferbewertungen (5.710.934)
Dieser Artikel (1)
Alle Artikel (5.710.934)
- v***o (229)- Bewertung vom Käufer.Letzter MonatBestätigter KaufGreat quality book
- c***m (426)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufWOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!The Internment of Japanese Americans During World War II (Nr. 146005407795)
- v***v (2073)- Bewertung vom Käufer.Letzter MonatBestätigter KaufAlthough this book was not as described, with no picture of it in the listing, the seller communicated well and quickly gave me a full refund while letting me keep it. The minimal packaging left the book a bit vulnerable (typical for ThriftBooks), but it did arrive safely and timely. As usual, it’s hit or miss with this seller, but often times you can get great values, and their customer service is always very good. Many other sellers with millions of transactions don’t even communicate.
- 2***j (113)- Bewertung vom Käufer.Letzter MonatBestätigter KaufI've ordered several items from this vendor now and they've always been what they were advertised as. This was no exception. Both discs were in great shape as well as their jewel cases. Delivery is good, packaging is simple but effective for what you're paying and I haven't had any get damaged. Will keep buying from this vendor because of the results so far and good prices, too.
Produktbewertungen & Rezensionen
Noch mehr entdecken:
- The Face Zeitschriften,
- The Culinary Chronicle Kochbücher,
- Frederick-the-Great-Belletristik - Bücher,
- Frederick-the-Great-Sachbuch Bücher,
- The Walking Dead Belletristik-Bücher,
- Erwachsene Masters of the Universe Hörbücher und Hörspiele,
- Masters of the Universe Jugendliche Hörbücher und Hörspiele,
- Robert-Kirkman-The-Walking - Dead-Belletristik-Bücher,
- Masters of the Universe Jugendliche Hörbücher und Hörspiele,
- Erwachsene Masters of the Universe Hörbücher und Hörspiele