|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn173682537 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
071005s2007 inua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d IDEBK
|d E7B
|d OCLCQ
|d VT2
|d UMI
|d OCLCQ
|d NTG
|d U5D
|d B24X7
|d REDDC
|d OCLCQ
|d MERUC
|d HEBIS
|d C6I
|d OCLCQ
|d DEBSZ
|d OCLCF
|d XFF
|d OCLCQ
|d NLE
|d OCLCQ
|d COO
|d OCLCQ
|d OCLCA
|d CEF
|d INT
|d AU@
|d OCLCQ
|d WYU
|d UAB
|d CNCEN
|d OTZ
|d ERF
|d UKBTH
|d UHL
|d LUN
|d EYM
|d TOH
|d UKAHL
|d OCLCO
|d OCLCQ
|d KSU
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA685683
|2 bnb
|
016 |
7 |
|
|a 013572730
|2 Uk
|
019 |
|
|
|a 154800308
|a 189099886
|a 489558421
|a 606038861
|a 646799871
|a 741565683
|a 765142889
|a 859882639
|a 1048156915
|a 1050966517
|a 1060195661
|a 1062866336
|a 1103265121
|a 1105774675
|a 1107427930
|a 1112557929
|a 1112987041
|a 1113510115
|a 1113772955
|a 1152995729
|a 1159607835
|a 1170634578
|a 1170692653
|a 1180602360
|a 1180612007
|a 1192335157
|a 1194749986
|a 1224592733
|a 1240513405
|
020 |
|
|
|a 9780470198827
|q (electronic bk.)
|
020 |
|
|
|a 0470198826
|q (electronic bk.)
|
020 |
|
|
|z 047008023X
|
020 |
|
|
|z 9780470080238
|
024 |
8 |
|
|a 9780470080238
|
029 |
1 |
|
|a AU@
|b 000053247701
|
029 |
1 |
|
|a AU@
|b 000059863404
|
029 |
1 |
|
|a AU@
|b 000067106786
|
029 |
1 |
|
|a DEBSZ
|b 368467147
|
029 |
1 |
|
|a HEBIS
|b 291534309
|
035 |
|
|
|a (OCoLC)173682537
|z (OCoLC)154800308
|z (OCoLC)189099886
|z (OCoLC)489558421
|z (OCoLC)606038861
|z (OCoLC)646799871
|z (OCoLC)741565683
|z (OCoLC)765142889
|z (OCoLC)859882639
|z (OCoLC)1048156915
|z (OCoLC)1050966517
|z (OCoLC)1060195661
|z (OCoLC)1062866336
|z (OCoLC)1103265121
|z (OCoLC)1105774675
|z (OCoLC)1107427930
|z (OCoLC)1112557929
|z (OCoLC)1112987041
|z (OCoLC)1113510115
|z (OCoLC)1113772955
|z (OCoLC)1152995729
|z (OCoLC)1159607835
|z (OCoLC)1170634578
|z (OCoLC)1170692653
|z (OCoLC)1180602360
|z (OCoLC)1180612007
|z (OCoLC)1192335157
|z (OCoLC)1194749986
|z (OCoLC)1224592733
|z (OCoLC)1240513405
|
037 |
|
|
|a CL0500000099
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b S464 2007eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
4 |
|a The shellcoder's handbook :
|b discovering and exploiting security holes /
|c Chris Anley [and others].
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Indianapolis, IN :
|b Wiley Pub.,
|c ©2007.
|
300 |
|
|
|a 1 online resource (xxiv, 718 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable co
|
505 |
0 |
|
|a Before You Begin -- Stack Overflows -- Shellcode -- Introduction to Format String Bugs -- Introduction to Heap Overflows -- The Wild World of Windows -- Windows Shellcode -- Windows Overflows -- Overcoming Filters -- Introduction to Solaris Exploitation -- Advanced Solaris Exploitation -- OS X Shellcode -- Cisco IOS Exploitation -- Protection Mechnisms -- Establishing a Working Environment -- Fault Injection -- The Art of Fuzzing -- Source Code Auditing : Finding Vulnerabilities in C-Based Languages -- Instrumented Investigation : A Manual Approach -- Tracing For Vulnerabilities -- Binary Auditing : Hacking Closed Source Software -- Alternative Payload Strategies -- Writing Exploits that Work in the Wild -- Attacking Database Software -- Unix Kernel Overflows -- Exploiting Unix Kernel Vulnerabilities -- Hacking the Windows Kernel.
|
542 |
|
|
|f Copyright © John Wiley & Sons
|g 2007
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Risk Assessment
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Évaluation du risque.
|
650 |
|
7 |
|a risk assessment.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Risk assessment
|2 fast
|
700 |
1 |
|
|a Anley, Chris.
|
700 |
1 |
|
|a Koziol, Jack.
|t Shellcoder's handbook.
|
776 |
0 |
8 |
|i Print version:
|t Shellcoder's handbook.
|b 2nd ed.
|d Indianapolis, IN : Wiley Pub., ©2007
|z 9780470080238
|z 047008023X
|w (DLC) 2007021079
|w (OCoLC)72868228
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470080238/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21622990
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00022770
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10278635
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 204776
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2712086
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3637731
|
994 |
|
|
|a 92
|b IZTAP
|