語系:
繁體中文
English
說明(常見問題)
回圖書館
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A guide to kernel exploitation = att...
~
Massimiliano, Oldani.
A guide to kernel exploitation = attacking the core /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
A guide to kernel exploitation/ Enrico Perla, Massimiliano Oldani.
其他題名:
attacking the core /
作者:
Perla, Enrico.
其他作者:
Massimiliano, Oldani.
出版者:
Burlington, MA :Syngress, : c2010.,
面頁冊數:
1 online resource.
標題:
Operating systems (Computers) - Security measures. -
電子資源:
http://www.sciencedirect.com/science/book/9781597494861
ISBN:
9781597494861
A guide to kernel exploitation = attacking the core /
Perla, Enrico.
A guide to kernel exploitation
attacking the core /[electronic resource] :Enrico Perla, Massimiliano Oldani. - Burlington, MA :Syngress,c2010. - 1 online resource.
Includes bibliographical references and index.
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
ISBN: 9781597494861
Source: 1057637:10580031Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
323128
Operating systems (Computers)
--Security measures.Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: QA76.76.O63 / P5168 2010
Dewey Class. No.: 005.8
A guide to kernel exploitation = attacking the core /
LDR
:03730cmm 2200337Ia 4500
001
166305
003
OCoLC
005
20111122085747.0
006
m d
007
cr cn|||||||||
008
160302s2010 mau ob 001 0 eng d
020
$a
9781597494861
020
$a
1597494860
029
1
$a
NZ1
$b
13642354
035
$a
(OCoLC)668210511
035
$a
ocn668210511
037
$a
1057637:10580031
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
049
$a
TEFA
050
4
$a
QA76.76.O63
$b
P5168 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Perla, Enrico.
$3
323126
245
1 2
$a
A guide to kernel exploitation
$h
[electronic resource] :
$b
attacking the core /
$c
Enrico Perla, Massimiliano Oldani.
260
$a
Burlington, MA :
$c
c2010.
$b
Syngress,
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
520
$a
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
588
$a
Description based on print version record.
650
0
$a
Operating systems (Computers)
$x
Security measures.
$3
323128
650
0
$a
Computer security.
$3
86565
655
4
$a
Electronic books.
$2
local.
$3
96803
700
1
$a
Massimiliano, Oldani.
$3
323127
776
0 8
$i
Print version:
$a
Perla, Enrico.
$t
Guide to kernel exploitation.
$d
Burlington, MA : Syngress, c2010
$z
9781597494861
$w
(DLC) 2010027939
$w
(OCoLC)432982310
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597494861
938
$a
Coutts Information Services
$b
COUT
$n
16426813
$c
49.95 USD
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入