Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A guide to kernel exploitationattack...
~
Massimiliano, Oldani.
A guide to kernel exploitationattacking the core /
Record Type:
Electronic resources : Monograph/item
Title/Author:
A guide to kernel exploitationEnrico Perla, Massimiliano Oldani.
Reminder of title:
attacking the core /
Author:
Perla, Enrico.
other author:
Massimiliano, Oldani.
Published:
Burlington, MA :Syngress,c2010.
Description:
1 online resource.
Subject:
Operating systems (Computers)Security measures.
Online resource:
http://www.sciencedirect.com/science/book/9781597494861
ISBN:
9781597494861
A guide to kernel exploitationattacking the core /
Perla, Enrico.
A guide to kernel exploitation
attacking the core /[electronic resource] :Enrico Perla, Massimiliano Oldani. - Burlington, MA :Syngress,c2010. - 1 online resource.
Includes bibliographical references and index.
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
ISBN: 9781597494861
Source: 1057637:10580031Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
536169
Operating systems (Computers)
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.76.O63 / P5168 2010
Dewey Class. No.: 005.8
A guide to kernel exploitationattacking the core /
LDR
:03753cmm 2200349Ia 4500
001
313556
003
OCoLC
005
20111122085747.0
006
m d
007
cr cn|||||||||
008
111229s2010 mau ob 001 0 eng d
020
$a
9781597494861
020
$a
1597494860
029
1
$a
NZ1
$b
13642354
035
$a
(OCoLC)668210511
035
$a
ocn668210511
035
$a
313556
037
$a
1057637:10580031
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
049
$a
TEFA
050
4
$a
QA76.76.O63
$b
P5168 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Perla, Enrico.
$3
536167
245
1 2
$a
A guide to kernel exploitation
$h
[electronic resource] :
$b
attacking the core /
$c
Enrico Perla, Massimiliano Oldani.
260
$a
Burlington, MA :
$b
Syngress,
$c
c2010.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
520
$a
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
588
$a
Description based on print version record.
650
0
$a
Operating systems (Computers)
$x
Security measures.
$3
536169
650
0
$a
Computer security.
$3
184416
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Massimiliano, Oldani.
$3
536168
776
0 8
$i
Print version:
$a
Perla, Enrico.
$t
Guide to kernel exploitation.
$d
Burlington, MA : Syngress, c2010
$z
9781597494861
$w
(DLC) 2010027939
$w
(OCoLC)432982310
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597494861
938
$a
Coutts Information Services
$b
COUT
$n
16426813
$c
49.95 USD
994
$a
C0
$b
TEF
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000060520
電子館藏
1圖書
電子書
EB QA76.76.O63 P5168 c2010
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781597494861
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login