هذا المُنتج قد لا يكون متوفراً الآن.

سعر ومواصفات A Guide to Kernel Exploitation : Attacking the Core

  • أفضل سعر لـ A Guide to Kernel Exploitation : Attacking the Core by جوميا فى مصر هو 793 ج.م.
  • طرق الدفع المتاحة هى
    دفع عند الاستلامبطاقة ائتمانيةالدفع الاليكترونى
  • تكلفة التوصيل هى 15 ج.م., والتوصيل فى خلال 2-5 أيام
  • تباع المنتجات المماثلة لـ A Guide to Kernel Exploitation : Attacking the Core فى جوميا, ديوان مع اسعار تبدأ من 1,906 ج.م.
  • أول ظهور لهذا المنتج كان فى مارس 23, 2016
  • من بين المنتجات المماثلة لـ A Guide to Kernel Exploitation : Attacking the Core أرخص سعر هو 395 ج.م. من ديوان

المواصفات الفنية

SKU:JU030BKAJA6XNAFAMZ
المؤلف:Enrico Perla
الموديل:9781597494861

منتجات مماثلة

متجر

طرق الدفع

مدة التوصيل

تكلفة التوصيل

وصف جوميا

  • Format‎:‎ Paperback
  • Number of Pages‎:‎ 466 pages
  • Dimensions‎:‎ 190.5 x 233.68 x 25.4mm
  • Weight‎:‎ 816.46g
  • Publication date‎:‎ 28 Oct 2010
  • Publisher‎:‎ Syngress Media‎,‎U‎.‎S‎.‎

A Guide to Kernel Exploitation‎:‎ Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel‎-level exploits‎,‎ and applies them to different operating systems‎,‎ namely‎,‎ UNIX derivatives‎,‎ Mac OS X‎,‎ and Windows‎.‎ Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched‎,‎ the foundational information provided will help hackers in writing a newer‎,‎ better attack‎;‎ or help pen testers‎,‎ auditors‎,‎ and the like develop a more concrete design and defensive structure‎.‎ The book is organized into four parts‎.‎ Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book‎.‎ Part II focuses on different operating systems and describes exploits for them that target various bug classes‎.‎ Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues‎.‎ It includes a step‎-by‎-step analysis of the development of a reliable‎,‎ one‎-shot‎,‎ remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel‎.‎ Finally‎,‎ Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold‎.‎ * Covers a range of operating system families ‎- UNIX derivatives‎,‎ Mac OS X‎,‎ Windows* Details common scenarios such as generic memory corruption ‎(‎stack overflow‎,‎ heap overflow‎,‎ etc‎.‎‎)‎ issues‎,‎ logical bugs and race conditions* Delivers the reader from user‎-land exploitation to the world of kernel‎-land ‎(‎OS‎)‎ exploits/attacks‎,‎ with a particular focus on the steps that lead to the creation of successful techniques‎,‎ in order to give to the reader something more than just a set of tricks

الأكثر شهرة في كتبالمزيد

    مميزات وعيوب A Guide to Kernel Exploitation : Attacking the Core

    • لا يوجد تقييمات لهذا المُنتج.

    مراجعات A Guide to Kernel Exploitation : Attacking the Core

    • loading video reviews