Foto 1 di 1

Galleria
Foto 1 di 1

Ne hai uno da vendere?
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
by Koziol, Jack; Litchfield,... | PB | Acceptable
US $6,55
CircaEUR 5,62
Condizione:
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ”... Maggiori informazioniinformazioni sulla condizione
Accettabile
Libro con evidenti segni di usura. Può avere alcuni danni alla copertina, senza che l'integrità sia compromessa. La rilegatura può essere leggermente danneggiata, senza che l'integrità sia compromessa. Può avere scritte ai margini, sottolineature ed evidenziazioni di testo, ma nessuna pagina mancante né altri danni che potrebbero compromettere la leggibilità o la comprensibilità del testo. Per maggiori dettagli e la descrizione di eventuali imperfezioni, consulta l'inserzione del venditore.
3 disponibili1 venduto
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis Economy Shipping.
Oggetto che si trova a: Aurora, Illinois, Stati Uniti
Consegna:
Consegna prevista tra il lun 25 ago e il ven 29 ago a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico del venditore.
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:146241410318
Specifiche dell'oggetto
- Condizione
- Accettabile
- Note del venditore
- Binding
- Paperback
- Book Title
- The Shellcoder's Handbook
- Weight
- 2 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9780764544682
Informazioni su questo prodotto
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0764544683
ISBN-13
9780764544682
eBay Product ID (ePID)
5960347
Product Key Features
Number of Pages
644 Pages
Publication Name
Shellcoder's Handbook : Discovering and Exploiting Security Holes
Language
English
Publication Year
2004
Subject
Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.4 in
Item Weight
34.3 Oz
Item Length
9.3 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
LCCN
2003-027629
Reviews
"...80%...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed..." ( PC Utilities , July 2004) "...essential for administrators who want to secure computer systems under their management..." ( Computer Weekly , March 2004) "...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
TitleLeading
The
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
About the Authors.Credits.Acknowledgments.Part 1: Introduction to Exploitation: Linux on x86.Chapter 1: Before You Begin.Chapter 2: Stack Overflows.Chapter 3: Shellcode.Chapter 4: Introduction to Format String Bugs.Chapter 5: Introduction to Heap Overflows.Part 2: Exploiting More Platforms: Windows, Solaris, and Tru64.Chapter 6: The Wild World of Windows.Chapter 7: Windows Shellcode.Chapter 8: Windows Overflows.Chapter 9: Overcoming Filters.Chapter 10: Introduction to Solaris Exploitation.Chapter 11: Advanced Solaris Exploitation.Chapter 12: HP Tru64 Unix Exploitation.Part 3: Vulnerability Discovery.Chapter 13: Establishing a Working Environment.Chapter 14: Fault Injection.Chapter 15: The Art of Fuzzing.Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages.Chapter 17: Instrumented Investigation: A Manual Approach.Chapter 18: Tracing for Vulnerabilities.Chapter 19: Binary Auditing: Hacking Closed Source Software.Part 4: Advanced Materials.Chapter 20: Alternative Payload Strategies.Chapter 21: Writing Exploits that Work in the Wild.Chapter 22: Attacking Database Software.Chapter 23: Kernel Overflows.Chapter 24: Exploiting Kernel Vulnerabilities.Index.
Synopsis
Uncover, exploit, and close security holes in any software or operating systemEvery day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, youa'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed."The Shellcodera's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows r , Linux r , and Solaris TM ) and applications (including MS SQL Server and Oracle r databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniques, Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
LC Classification Number
QA76.9.A25
Descrizione dell'oggetto fatta dal venditore
Informazioni sul venditore professionale
Informazioni su questo venditore
ThriftBooks
98,9% di Feedback positivi•19,8 milioni oggetti venduti
Registrato come venditore professionale
Feedback sul venditore (5.710.857)
Questo oggetto (1)
Tutti gli oggetti (5.710.857)
- v***o (229)- Feedback lasciato dall'acquirente.Mese scorsoAcquisto verificatoGreat quality book
- c***m (426)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoWOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!The Internment of Japanese Americans During World War II (N° 146005407795)
- v***v (2070)- Feedback lasciato dall'acquirente.Mese scorsoAcquisto verificatoAlthough this book was not as described, with no picture of it in the listing, the seller communicated well and quickly gave me a full refund while letting me keep it. The minimal packaging left the book a bit vulnerable (typical for ThriftBooks), but it did arrive safely and timely. As usual, it’s hit or miss with this seller, but often times you can get great values, and their customer service is always very good. Many other sellers with millions of transactions don’t even communicate.
- 2***j (113)- Feedback lasciato dall'acquirente.Mese scorsoAcquisto verificatoI've ordered several items from this vendor now and they've always been what they were advertised as. This was no exception. Both discs were in great shape as well as their jewel cases. Delivery is good, packaging is simple but effective for what you're paying and I haven't had any get damaged. Will keep buying from this vendor because of the results so far and good prices, too.