Cargando…
Hacking: the art of exploitation
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit progr...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
No Starch Press
2003
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1991511 |
_version_ | 1780945777300865024 |
---|---|
author | Erickson, Jon |
author_facet | Erickson, Jon |
author_sort | Erickson, Jon |
collection | CERN |
description | A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. |
id | cern-1991511 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2003 |
publisher | No Starch Press |
record_format | invenio |
spelling | cern-19915112021-04-21T20:28:21Zhttp://cds.cern.ch/record/1991511engErickson, JonHacking: the art of exploitationComputing and ComputersA comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.No Starch Pressoai:cds.cern.ch:19915112003 |
spellingShingle | Computing and Computers Erickson, Jon Hacking: the art of exploitation |
title | Hacking: the art of exploitation |
title_full | Hacking: the art of exploitation |
title_fullStr | Hacking: the art of exploitation |
title_full_unstemmed | Hacking: the art of exploitation |
title_short | Hacking: the art of exploitation |
title_sort | hacking: the art of exploitation |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1991511 |
work_keys_str_mv | AT ericksonjon hackingtheartofexploitation |