The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.].
Material type: TextPublication details: Indianapolis, IN : Wiley Pub., c2007Edition: 2nd edDescription: xxiv, 718 p. : ill. ; 24 cmISBN: 9780470080238 (pbk.)Subject(s): Computer security | Data protection | Risk assessmentDDC classification: 005.8 LOC classification: QA76.9.A25 | S54 2007Online resources: Cover | Table of contents | Table of contents | Contributor biographical information | Publisher descriptionItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | QA76.9.A25 S54 2007 c.1 (Browse shelf (Opens below)) | 1 | Missing | 00007360 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 S54 2007 c.2 (Browse shelf (Opens below)) | 2 | Available | 00007359 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 S45 2009 c.2 Gray hat Python : | QA76.9.A25 S53 2002 c.1 Linux security / | QA76.9.A25 S54 2007 c.1 The shellcoder's handbook : | QA76.9.A25 S54 2007 c.2 The shellcoder's handbook : | QA76.9.A25 S55 2017 c.1 Digital watermarking and steganography : | QA76.9.A25 S64 2008 c.1 Software security engineering : | QA76.9.A25 S65 2008 c.1 The craft of system security / |
Includes index.
"The shellcoder's handbook : discovering and exploiting security holes (1st edition) was written by Jack Koziol ... [et al.]."
Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.
"In a nutshell, this book is about code and data and what happens when the two become confused. You'll work with the basic building blocks of security bugs--assembler, source code, the stack, the heap, and so on. You'll experiment, explore, and understand the systems you're running--and how to better protect them." --Back cover.
There are no comments on this title.