Cargando…

Hacking: the art of exploitation

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit progr...

Descripción completa

Detalles Bibliográficos
Autor principal: Erickson, Jon
Lenguaje:eng
Publicado: No Starch Press 2003
Materias:
Acceso en línea:http://cds.cern.ch/record/1991511
_version_ 1780945777300865024
author Erickson, Jon
author_facet Erickson, Jon
author_sort Erickson, Jon
collection CERN
description A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
id cern-1991511
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2003
publisher No Starch Press
record_format invenio
spelling cern-19915112021-04-21T20:28:21Zhttp://cds.cern.ch/record/1991511engErickson, JonHacking: the art of exploitationComputing and ComputersA comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.No Starch Pressoai:cds.cern.ch:19915112003
spellingShingle Computing and Computers
Erickson, Jon
Hacking: the art of exploitation
title Hacking: the art of exploitation
title_full Hacking: the art of exploitation
title_fullStr Hacking: the art of exploitation
title_full_unstemmed Hacking: the art of exploitation
title_short Hacking: the art of exploitation
title_sort hacking: the art of exploitation
topic Computing and Computers
url http://cds.cern.ch/record/1991511
work_keys_str_mv AT ericksonjon hackingtheartofexploitation