share_book
Envoyer cet article par e-mail

A Guide to Kernel Exploitation: Attacking the Core

ou partager sur :

share_comment
Partager ce commentaire par e-mail

ou partager sur :

PRÊT A ACHETER?
(vous pouvez toujours annuler plus tard)


J'aime
A Guide to Kernel Exploitation: Attacking the Core

A Guide to Kernel Exploitation: Attacking the Core

  (Auteur),   (Auteur)


Prix : Cet article n'a pas encore de prix  ask_price

Demande de cotation sur ""
Ce titre est nouveau dans notre fonds d'ouvrages et nous ne l'avons encore jamais vendu à ce jour.
Notre engagement: Vous obtenir le meilleur prix
Aussi nombreux que soient les titres que nous référençons, absolument rien n'est automatisé dans la fixation de nos prix; et plutôt que de convertir automatiquement le prix en euros et risquer de répercuter sur vous un prix artificiellement élevé, nous vous faisons un devis rapide après avoir vérifié les prix auprès de nos différents fournisseurs.
Cette étape de demande de cotation est rapide (généralement quelques heures) et vise à vous faire bénéficier en permanence du meilleur prix pour vos achats de livres.


Sur commande

Des articles qui pourraient aussi vous intéresser

    Description de "A Guide to Kernel Exploitation: Attacking the Core"

    The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

    Détails sur le produit

    • Reliure : Paperback
    • 442  pages
    • Dimensions :  2.5cmx19.1cmx23.4cm
    • Poids : 816.5g
    • Editeur :   Syngress Paru le
    • ISBN :  1597494860
    • EAN13 :  9781597494861
    • Langue : Anglais

    Commentaires sur cet article

    Personne n'a encore laissé de commentaire. Soyez le premier!

    Laisser un commentaire

    Rechercher des articles similaires par rayon

    Rechercher par thèmes associés

    The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks