語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A guide to kernel exploitation = att...
~
Perla, Enrico.{me_controlnum}
FindBook
Google Book
Amazon
博客來
A guide to kernel exploitation = attacking the core /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
A guide to kernel exploitation/ Enrico Perla, Massimiliano Oldani.
其他題名:
attacking the core /
作者:
Perla, Enrico.{me_controlnum}
其他作者:
Massimiliano, Oldani.
出版者:
Burlington, MA :Syngress, : c2010.,
面頁冊數:
1 online resource.
內容註:
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
標題:
Operating systems (Computers) - Security measures. -
電子資源:
http://www.sciencedirect.com/science/book/9781597494861
ISBN:
9781597494861
A guide to kernel exploitation = attacking the core /
Perla, Enrico.{me_controlnum}
A guide to kernel exploitation
attacking the core /[electronic resource] :Enrico Perla, Massimiliano Oldani. - Burlington, MA :Syngress,c2010. - 1 online resource.
Includes bibliographical references and index.
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
ISBN: 9781597494861
Source: 1057637:10580031Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
1374736
Operating systems (Computers)
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.76.O63 / P5168 2010
Dewey Class. No.: 005.8
A guide to kernel exploitation = attacking the core /
LDR
:03730cmm 2200337Ia 4500
001
1046255
003
OCoLC
005
20111122085747.0
006
m d
007
cr cn|||||||||
008
120427s2010 mau ob 001 0 eng d
020
$a
9781597494861
020
$a
1597494860
029
1
$a
NZ1
$b
13642354
035
$a
(OCoLC)668210511
035
$a
ocn668210511
037
$a
1057637:10580031
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
049
$a
TEFA
050
4
$a
QA76.76.O63
$b
P5168 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Perla, Enrico.{me_controlnum}
$3
1374734
245
1 2
$a
A guide to kernel exploitation
$h
[electronic resource] :
$b
attacking the core /
$c
Enrico Perla, Massimiliano Oldani.
260
$a
Burlington, MA :
$b
Syngress,
$c
c2010.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
520
$a
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
588
$a
Description based on print version record.
650
0
$a
Operating systems (Computers)
$x
Security measures.
$3
1374736
650
0
$a
Computer security.
$3
540555
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Massimiliano, Oldani.
$3
1374735
776
0 8
$i
Print version:
$a
Perla, Enrico.
$t
Guide to kernel exploitation.
$d
Burlington, MA : Syngress, c2010
$z
9781597494861
$w
(DLC) 2010027939
$w
(OCoLC)432982310
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597494861
938
$a
Coutts Information Services
$b
COUT
$n
16426813
$c
49.95 USD
994
$a
C0
$b
TEF
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9134972
電子資源
11.線上閱覽_V
電子書
EB QA76.76.O63 P5168 2010
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入