Cargando…
Buffer overflow attacks: detect, exploit, prevent
Autor principal: | Foster, James C |
---|---|
Lenguaje: | eng |
Publicado: |
Syngress,
2005
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1511661 |
Ejemplares similares
-
Network attacks and exploitation: a framework
por: Monte, Matthew
Publicado: (2015) -
Targeted cyber attacks: multi-staged attacks driven by exploits and malware
por: Sood, Aditya K, et al.
Publicado: (2014) -
A guide to kernel exploitation: attacking the core
por: Perla, Enrico, et al.
Publicado: (2011) -
Attacking network protocols: a hacker's guide to capture, analysis, and exploitation
por: Forshaw, James
Publicado: (2018) -
Cross Site Scripting Attacks: XSS Exploits and Defense
por: Fogie, Seth
Publicado: (2007)