|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm64218908 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
060223s2006 mau obf 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d TUU
|d OCLCQ
|d B24X7
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCQ
|d N15
|d E7B
|d IDEBK
|d NTG
|d DKDLA
|d MHW
|d OPELS
|d OKU
|d FVL
|d DEBSZ
|d AU@
|d OCL
|d OCLCQ
|d AZK
|d LOA
|d JBG
|d AGLDB
|d COCUF
|d CNNOR
|d MOR
|d PIFBR
|d LIV
|d OCLCQ
|d WY@
|d U3W
|d OCLCA
|d LUE
|d STF
|d BRL
|d WRM
|d D6H
|d WCO
|d VTS
|d NRAMU
|d EZ9
|d OCLCQ
|d INT
|d VT2
|d OCLCQ
|d COO
|d A6Q
|d OCLCQ
|d LEAUB
|d M8D
|d UKCRE
|d INARC
|d S2H
|d OCLCO
|d OCLCQ
|d IOY
|d OCLCQ
|d QGK
|d COA
|d OCLCO
|
019 |
|
|
|a 70925770
|a 84145948
|a 162597702
|a 181421137
|a 473722852
|a 475321967
|a 647464662
|a 722429473
|a 728037592
|a 780982323
|a 856960413
|a 961584038
|a 962656568
|a 968296124
|a 988413330
|a 991915958
|a 1035708642
|a 1037504239
|a 1038607951
|a 1045562501
|a 1047575764
|a 1055404316
|a 1076307803
|a 1081225605
|a 1153003495
|a 1228603876
|a 1259071754
|a 1340066705
|
020 |
|
|
|a 1423754980
|q (electronic bk.)
|
020 |
|
|
|a 9781423754985
|q (electronic bk.)
|
020 |
|
|
|a 0080493130
|
020 |
|
|
|a 9780080493138
|
020 |
|
|
|a 9781597499972
|
020 |
|
|
|a 1597499978
|
020 |
|
|
|a 1281035777
|
020 |
|
|
|a 9781281035776
|
020 |
|
|
|a 9786611035778
|
020 |
|
|
|a 661103577X
|
020 |
|
|
|a 1597490946
|
020 |
|
|
|a 9781597490948
|
024 |
8 |
|
|a (WaSeSS)ssj0000275355
|
029 |
1 |
|
|a AU@
|b 000048761589
|
029 |
1 |
|
|a AU@
|b 000051860608
|
029 |
1 |
|
|a AU@
|b 000053225043
|
029 |
1 |
|
|a AU@
|b 000054160031
|
029 |
1 |
|
|a AU@
|b 000066766779
|
029 |
1 |
|
|a CHBIS
|b 005831681
|
029 |
1 |
|
|a CHNEW
|b 001004863
|
029 |
1 |
|
|a CHVBK
|b 168491761
|
029 |
1 |
|
|a DEBBG
|b BV042307669
|
029 |
1 |
|
|a DEBBG
|b BV043092984
|
029 |
1 |
|
|a DEBSZ
|b 405313489
|
029 |
1 |
|
|a DEBSZ
|b 422285250
|
029 |
1 |
|
|a DEBSZ
|b 430324251
|
029 |
1 |
|
|a GBVCP
|b 801399610
|
029 |
1 |
|
|a NZ1
|b 12033481
|
035 |
|
|
|a (OCoLC)64218908
|z (OCoLC)70925770
|z (OCoLC)84145948
|z (OCoLC)162597702
|z (OCoLC)181421137
|z (OCoLC)473722852
|z (OCoLC)475321967
|z (OCoLC)647464662
|z (OCoLC)722429473
|z (OCoLC)728037592
|z (OCoLC)780982323
|z (OCoLC)856960413
|z (OCoLC)961584038
|z (OCoLC)962656568
|z (OCoLC)968296124
|z (OCoLC)988413330
|z (OCoLC)991915958
|z (OCoLC)1035708642
|z (OCoLC)1037504239
|z (OCoLC)1038607951
|z (OCoLC)1045562501
|z (OCoLC)1047575764
|z (OCoLC)1055404316
|z (OCoLC)1076307803
|z (OCoLC)1081225605
|z (OCoLC)1153003495
|z (OCoLC)1228603876
|z (OCoLC)1259071754
|z (OCoLC)1340066705
|
037 |
|
|
|a 131902:132009
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a QA76.9.A25
|b F67 2006eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Foster, James C.
|
245 |
1 |
0 |
|a Writing security tools and exploits /
|c James C. Foster, Vincent Liu.
|
260 |
|
|
|a Rockland, MA :
|b Syngress,
|c ©2006.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
380 |
|
|
|a Handbook
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index.
|
520 |
|
|
|a Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Sécurité informatique
|v Guides, manuels, etc.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
0 |
|a Electronic books.
|
655 |
|
2 |
|a Handbook
|
655 |
|
7 |
|a handbooks.
|2 aat
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals.
|2 lcgft
|
655 |
|
7 |
|a Guides et manuels.
|2 rvmgf
|
700 |
1 |
|
|a Liu, Vincent.
|
776 |
0 |
8 |
|i Print version:
|a Foster, James C.
|t Writing security tools and exploits.
|d Rockland, MA : Syngress, ©2006
|z 1597499978
|z 9781597499972
|w (OCoLC)64386244
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149589
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00005244
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10110279
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 149589
|
938 |
|
|
|a Internet Archive
|b INAR
|n writingsecurityt0000fost
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2395179
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2627188
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2730642
|
994 |
|
|
|a 92
|b IZTAP
|