001
000001892
003
LDTU
020
$a1593270070
041
$aeng
082
$a005.8
100
$aErickson,Jon
245
$aHacking $bThe art of exploitation $cJon Erickson
260
$a San Francisco $bNo Starch Press $c2003
300
$a241 p. $c24cm
504
$a includes bibliographical references and index
520
$aIn Hacking: the art of exploitation you will learn how to: Exploit programs using buffer overflows and format strings; Write your own printable ASCII polymorphic shellcode; Defeat non-executable stacks by returning into libc; Redirect network traffic, conceal open posts, and hijack TCP connections; Crack encrypted 802.11b wireless tracffic using the FMS attack.
650
$aComputer security
653
$aComputer security
852
$a209 Phan Thanh $bTiếng Anh
911
Trần Thị Yến Phương
927
Mua
928
8986
Sách Chuyên ngành
- Learning Perl: making easy things easy and hard things possible : 8th ed.
- Computer networking bible 3 in 1 : the complete crash course to effectively design, implement and manage networks. Including sections on security, performance and scalability
- Digital forensics and incident response : incident response tools and techniques for effective cyber threat response : 3rd ed.
- Computer networking : a top-down approach : 8th ed.
- Security engineering : a guide to building dependable distributed systems : 3rd ed.
Sách cùng chủ đề
- Computer networking bible 3 in 1 : the complete crash course to effectively design, implement and manage networks. Including sections on security, performance and scalability
- Cybersecurity
- Computer and information security handbook : 3rd ed
- Network security essentials : applications and standards : 4th ed.
- The fundamentals of network security