Shellcoder's Handbook Discovering and Exploiting Security Holes

ISBN-10: 047008023X

ISBN-13: 9780470080238

Edition: 2nd 2007 (Revised)

List price: $49.99 Buy it from $36.64
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

Find out where security holes come from and how to close them so they never occur again. This book pinpoints vulnerabilities in popular operating systems and applications and shows the reader how to write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken.
New Starting from $36.64
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $49.99
Edition: 2nd
Copyright year: 2007
Publisher: John Wiley & Sons, Incorporated
Publication date: 8/20/2007
Binding: Paperback
Pages: 744
Size: 8.50" wide x 9.25" long x 1.50" tall
Weight: 1.210

About the Authors
Acknowledgments
Introduction to the Second Edition
Introduction to Exploitation: Linux on x
Before You Begin
Stack Overflows
Shellcode
Introduction to Format String Bugs
Introduction to Heap Overflows
Other Platforms-Windows, Solaris, OS/X, and Cisco
The Wild World of Windows
Windows Shellcode
Windows Overflows
Overcoming Filters
Introduction to Solaris Exploitation
Advanced Solaris Exploitation
OS X Shellcode
Cisco IOS Exploitation
Protection Mechanisms
Vulnerability Discovery
Establishing a Working Environment
Fault Injection
The Art of Fuzzing
Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Instrumented Investigation: A Manual Approach
Tracing for Vulnerabilities
Binary Auditing: Hacking Closed Source Software
Advanced Materials
Alternative Payload Strategies
Writing Exploits that Work in the Wild
Attacking Database Software
Unix Kernel Overflows
Exploiting Unix Kernel Vulnerabilities
Hacking the Windows Kernel
Index
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×