Hacking : the art of exploitation /
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
San Francisco, Calif. :
No Starch Press,
©2008.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn567957090 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 071015s2008 caua ob 001 0 eng d | ||
010 | |a 2007042910 | ||
040 | |a CCO |b eng |e pn |c CCO |d E7B |d OCLCQ |d UMI |d TXJ |d CEF |d DKDLA |d NHM |d FVL |d OCLCQ |d DEBSZ |d LGG |d B24X7 |d N$T |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d OCLCA |d OCL |d TEFOD |d EBLCP |d TEFOD |d OCLCQ |d COO |d AZK |d YDX |d JBG |d AGLDB |d MOR |d PIFBR |d ZCU |d MERUC |d OCLCQ |d AL5MG |d CNNOR |d LOA |d K6U |d OCLCA |d STF |d U3W |d D6H |d OCLCQ |d BRL |d WRM |d OCLCQ |d ICG |d VT2 |d CNCEN |d OCLCQ |d WYU |d G3B |d S9I |d TKN |d UAB |d A6Q |d DKC |d AU@ |d OCLCQ |d EQK |d OCLCQ |d ERF |d UKBTH |d UHL |d OCLCQ |d TEFOD |d UKCRE |d BRF |d OCLCQ |d EYM |d TOH |d OCLCO |d INARC |d TAC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 219606838 |a 290537332 |a 475262124 |a 475380402 |a 648357158 |a 716035754 |a 722648316 |a 728035778 |a 765143686 |a 781639618 |a 830164411 |a 961589010 |a 962354774 |a 962561393 |a 968765480 |a 980514065 |a 980855461 |a 985341689 |a 985395995 |a 985480338 |a 988488488 |a 991958215 |a 993587774 |a 993638363 |a 993761221 |a 1010976965 |a 1014366187 |a 1017931369 |a 1020161734 |a 1029496323 |a 1037424331 |a 1037792029 |a 1038688120 |a 1044238063 |a 1048193617 |a 1050970257 |a 1055342695 |a 1055770548 |a 1056323274 |a 1057988816 |a 1060192887 |a 1060864850 |a 1061003024 |a 1064145937 |a 1074304362 |a 1081199784 |a 1083596240 |a 1103257454 |a 1105783896 |a 1112603695 |a 1112972939 |a 1113396260 |a 1127860130 |a 1153052823 |a 1159639364 |a 1192342888 |a 1194730284 |a 1228513278 |a 1228548072 |a 1240529556 |a 1302074660 |a 1302700326 |a 1340067834 |a 1340075745 |a 1355686690 | ||
020 | |a 9781593273385 |q (electronic bk.) | ||
020 | |a 159327338X |q (electronic bk.) | ||
020 | |a 9781593271442 |q (electronic bk.) | ||
020 | |a 1593271441 |q (electronic bk.) | ||
024 | 8 | |a 9781593271442 | |
024 | 8 | |a VM362373 | |
029 | 1 | |a AU@ |b 000050770285 | |
029 | 1 | |a AU@ |b 000051368880 | |
029 | 1 | |a DEBBG |b BV043089654 | |
029 | 1 | |a DEBSZ |b 355442892 | |
029 | 1 | |a DEBSZ |b 397494017 | |
029 | 1 | |a DEBSZ |b 421438428 | |
029 | 1 | |a GBVCP |b 803095899 | |
029 | 1 | |a HEBIS |b 291513190 | |
029 | 1 | |a NZ1 |b 14228833 | |
029 | 1 | |a AU@ |b 000063969836 | |
029 | 1 | |a AU@ |b 000067111549 | |
029 | 1 | |a AU@ |b 000068978774 | |
035 | |a (OCoLC)567957090 |z (OCoLC)219606838 |z (OCoLC)290537332 |z (OCoLC)475262124 |z (OCoLC)475380402 |z (OCoLC)648357158 |z (OCoLC)716035754 |z (OCoLC)722648316 |z (OCoLC)728035778 |z (OCoLC)765143686 |z (OCoLC)781639618 |z (OCoLC)830164411 |z (OCoLC)961589010 |z (OCoLC)962354774 |z (OCoLC)962561393 |z (OCoLC)968765480 |z (OCoLC)980514065 |z (OCoLC)980855461 |z (OCoLC)985341689 |z (OCoLC)985395995 |z (OCoLC)985480338 |z (OCoLC)988488488 |z (OCoLC)991958215 |z (OCoLC)993587774 |z (OCoLC)993638363 |z (OCoLC)993761221 |z (OCoLC)1010976965 |z (OCoLC)1014366187 |z (OCoLC)1017931369 |z (OCoLC)1020161734 |z (OCoLC)1029496323 |z (OCoLC)1037424331 |z (OCoLC)1037792029 |z (OCoLC)1038688120 |z (OCoLC)1044238063 |z (OCoLC)1048193617 |z (OCoLC)1050970257 |z (OCoLC)1055342695 |z (OCoLC)1055770548 |z (OCoLC)1056323274 |z (OCoLC)1057988816 |z (OCoLC)1060192887 |z (OCoLC)1060864850 |z (OCoLC)1061003024 |z (OCoLC)1064145937 |z (OCoLC)1074304362 |z (OCoLC)1081199784 |z (OCoLC)1083596240 |z (OCoLC)1103257454 |z (OCoLC)1105783896 |z (OCoLC)1112603695 |z (OCoLC)1112972939 |z (OCoLC)1113396260 |z (OCoLC)1127860130 |z (OCoLC)1153052823 |z (OCoLC)1159639364 |z (OCoLC)1192342888 |z (OCoLC)1194730284 |z (OCoLC)1228513278 |z (OCoLC)1228548072 |z (OCoLC)1240529556 |z (OCoLC)1302074660 |z (OCoLC)1302700326 |z (OCoLC)1340067834 |z (OCoLC)1340075745 |z (OCoLC)1355686690 | ||
037 | |a CL0500000020 |b Safari Books Online | ||
037 | |a 4F68638D-38E2-439E-87DE-641EED535483 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b E75 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
084 | |a 54.38 |2 bcl | ||
084 | |a ST 277 |2 rvk | ||
049 | |a UAMI | ||
100 | 1 | |a Erickson, Jon, |d 1977- |1 https://id.oclc.org/worldcat/entity/E39PBJpYwPcFr8fyF9CppjjKVC | |
245 | 1 | 0 | |a Hacking : |b the art of exploitation / |c Jon Erickson. |
250 | |a 2nd ed. | ||
260 | |a San Francisco, Calif. : |b No Starch Press, |c ©2008. | ||
300 | |a 1 online resource (x, 472 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a 1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion. | |
588 | 0 | |a Print version record. | |
520 | |a Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. | ||
542 | |f Copyright © No Starch Press |g 2008 | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Hackers. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Pirates informatiques. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security. |2 blmlsh | |
650 | 7 | |a Computer hackers. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Databrott. |2 sao | |
650 | 7 | |a Datasäkerhet. |2 sao | |
653 | |a Security | ||
655 | 4 | |a Computer network resources. | |
758 | |i has work: |a Hacking (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGR8wY8dTXJF3gV7jKRwcq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Erickson, Jon, 1977- |t Hacking. |b 2nd ed. |d San Francisco, Calif. : No Starch Press, ©2008 |w (DLC) 2007042910 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781593271442/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1137538 |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00036704 | ||
938 | |a ebrary |b EBRY |n ebr10218383 | ||
938 | |a EBSCOhost |b EBSC |n 440046 | ||
938 | |a YBP Library Services |b YANK |n 7584312 | ||
938 | |a Internet Archive |b INAR |n hackingartofexpl0000eric_g6n4 | ||
994 | |a 92 |b IZTAP |