語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A guide to kernel exploitationattack...
~
Massimiliano, Oldani.
A guide to kernel exploitationattacking the core /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
A guide to kernel exploitationEnrico Perla, Massimiliano Oldani.
其他題名:
attacking the core /
作者:
Perla, Enrico.
其他作者:
Massimiliano, Oldani.
出版者:
Burlington, MA :Syngress,c2010.
面頁冊數:
1 online resource.
標題:
Operating systems (Computers)Security measures.
電子資源:
http://www.sciencedirect.com/science/book/9781597494861
ISBN:
9781597494861
A guide to kernel exploitationattacking the core /
Perla, Enrico.
A guide to kernel exploitation
attacking the core /[electronic resource] :Enrico Perla, Massimiliano Oldani. - Burlington, MA :Syngress,c2010. - 1 online resource.
Includes bibliographical references and index.
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
ISBN: 9781597494861
Source: 1057637:10580031Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
536169
Operating systems (Computers)
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.76.O63 / P5168 2010
Dewey Class. No.: 005.8
A guide to kernel exploitationattacking the core /
LDR
:03753cmm 2200349Ia 4500
001
313556
003
OCoLC
005
20111122085747.0
006
m d
007
cr cn|||||||||
008
111229s2010 mau ob 001 0 eng d
020
$a
9781597494861
020
$a
1597494860
029
1
$a
NZ1
$b
13642354
035
$a
(OCoLC)668210511
035
$a
ocn668210511
035
$a
313556
037
$a
1057637:10580031
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
049
$a
TEFA
050
4
$a
QA76.76.O63
$b
P5168 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Perla, Enrico.
$3
536167
245
1 2
$a
A guide to kernel exploitation
$h
[electronic resource] :
$b
attacking the core /
$c
Enrico Perla, Massimiliano Oldani.
260
$a
Burlington, MA :
$b
Syngress,
$c
c2010.
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
520
$a
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
588
$a
Description based on print version record.
650
0
$a
Operating systems (Computers)
$x
Security measures.
$3
536169
650
0
$a
Computer security.
$3
184416
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Massimiliano, Oldani.
$3
536168
776
0 8
$i
Print version:
$a
Perla, Enrico.
$t
Guide to kernel exploitation.
$d
Burlington, MA : Syngress, c2010
$z
9781597494861
$w
(DLC) 2010027939
$w
(OCoLC)432982310
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597494861
938
$a
Coutts Information Services
$b
COUT
$n
16426813
$c
49.95 USD
994
$a
C0
$b
TEF
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000060520
電子館藏
1圖書
電子書
EB QA76.76.O63 P5168 c2010
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9781597494861
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入