当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Hacking: The Art of Exploitation, 2nd Edition (CHM 英文版)

Hacking: The Art of Exploitation, 2nd Edition (CHM 英文版)

书名:Hacking: The Art of Exploitation, 2nd Edition (CHM 英文版)

上传:鱼和流氓

时间:2009-01-26

文件大小:4.67 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



(CHM 英文版)
by Jon Erickson
Publisher: No Starch
Pub Date: January 15, 2008
Print ISBN-13: 978-1-59-327144-2
Pages: 480


Program computers using C, assembly language, and shell scriptsCorrupt system memory to run arbitrary code using buffer overflows and format stringsInspect processor registers and system memory with a debugger to gain a real understanding of what is happeningOutsmart common security measures like nonexecutable stacks and intrusion detection systemsGain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presenceRedirect network traffic, conceal open ports, and hijack TCP connectionsCrack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
详细介绍,目录,试读,配套源码在此:http://www.nostarch.com/hacking2.htm
Tags:artCHMEditionExploitationThe


相关书籍

  • The Art of Error Correcting Coding, 2nd Edition
  • The Art of Multiprocessor Programming (PDF 英文版)
  • Apache Jakarta and Beyond: A Java Programmer’s Introduction
  • Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers
  • 算法的经典:The.Art.Of.Computer.Programming.-.Volume.4

评论 (1) 1 All

登陆 | 还没注册?