Shellcoder's Handbook Discovering and Exploiting Security Holes
Edition: 2nd 2007 (Revised)
List price: $49.99
Buy it from $20.60
This item qualifies for FREE shipping
*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: Find out where security holes come from and how to close them so they never occur again. This book pinpoints vulnerabilities in popular operating systems and applications and shows the reader how to write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $49.99
Copyright year: 2007
Publisher: John Wiley & Sons, Incorporated
Publication date: 8/20/2007
Size: 8.50" wide x 9.25" long x 1.50" tall
|About the Authors|
|Introduction to the Second Edition|
|Introduction to Exploitation: Linux on x|
|Before You Begin|
|Introduction to Format String Bugs|
|Introduction to Heap Overflows|
|Other Platforms-Windows, Solaris, OS/X, and Cisco|
|The Wild World of Windows|
|Introduction to Solaris Exploitation|
|Advanced Solaris Exploitation|
|OS X Shellcode|
|Cisco IOS Exploitation|
|Establishing a Working Environment|
|The Art of Fuzzing|
|Source Code Auditing: Finding Vulnerabilities in C-Based Languages|
|Instrumented Investigation: A Manual Approach|
|Tracing for Vulnerabilities|
|Binary Auditing: Hacking Closed Source Software|
|Alternative Payload Strategies|
|Writing Exploits that Work in the Wild|
|Attacking Database Software|
|Unix Kernel Overflows|
|Exploiting Unix Kernel Vulnerabilities|
|Hacking the Windows Kernel|