Matches in Library of Congress for { <http://lccn.loc.gov/2007021079> ?p ?o. }
Showing items 1 to 28 of
28
with 100 items per page.
- 2007021079 contributor B10774052.
- 2007021079 created "c2007.".
- 2007021079 date "2007".
- 2007021079 date "c2007.".
- 2007021079 dateCopyrighted "c2007.".
- 2007021079 description "Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.".
- 2007021079 extent "xxiv, 718 p. :".
- 2007021079 format "application/pdf".
- 2007021079 format "image/jpeg".
- 2007021079 identifier "047008023X (paper/website)".
- 2007021079 identifier "9780470080238 (paper/website)".
- 2007021079 identifier F?func=service&doc%5Flibrary=BVB01&doc%5Fnumber=017596070&line%5Fnumber=0001&func%5Fcode=DB%5FRECORDS&service%5Ftype=MEDIA.
- 2007021079 identifier 2007021079-b.html.
- 2007021079 identifier 2007021079-d.html.
- 2007021079 identifier 2007021079.html.
- 2007021079 identifier bsz287875032cov.htm.
- 2007021079 issued "2007".
- 2007021079 issued "c2007.".
- 2007021079 language "eng".
- 2007021079 publisher "Indianapolis, IN : Wiley Pub.,".
- 2007021079 subject "005.8 22".
- 2007021079 subject "Computer security.".
- 2007021079 subject "Data protection.".
- 2007021079 subject "QA76.9.A25 S464 2007".
- 2007021079 subject "Risk assessment.".
- 2007021079 tableOfContents "Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.".
- 2007021079 title "The shellcoder's handbook : discovering and exploiting security holes / Chris Anley ... [et al.].".
- 2007021079 type "text".