logo paquebote
8 libros encontrados buscando editorial: SYNGRESS

www.paquebote.com > SYNGRESS

Orden: · Ver: · Tipo:
ISBN:

1932266674

Buffer Overflow Attacks: Detect, Exploit, Prevent

Editorial: SYNGRESS MEDIA   Fecha de publicación:    Páginas: 304
Precio: 31,15
Añadir a la cesta
Disponible. Normalmente se envía en 7/14 días

Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows, Heap Corruption, and Format String Bugs Provides Case Studies for Most Major Platforms and Environments, Including Windows, FreeBSD, FrontPage, and Linux Avoid Worm or Custom Exploits by Analyzing Your Source Code to Detect Buffer Overflow Vulnerabilities Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker's "vulnerability of choice". These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of "custom exploits". These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster. James C. Foster's Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel's Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks. CONTENTS OF THIS BOOK INCLUDE Buffer Overflows: The Essentials Understanding Shellcode Writing Shellcode Win32 Assembly Case Study: FreeBSD NN Exploit Code Case Study: xlockmore User Supplied Format String Vulnerability (CVE-2000-0763) Case Study: FrontPage Denial of Service Utilizing WinSock Stack Overflows Heap Corruption Format String Attacks Windows Buffer Overflows Case Study: cURL buffer overflow on Linux Case Study: OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability (CAN-2002-0656) Case Study: X11R6 4.2 XLOCALEDIR Overflow Case Study: Microsoft MDAC Denial of Service Case Study: Local UUX Buffer Overflow on HPUX Finding Buffer Overflows in Source Case Study: InlineEgg I Case Study: InlineEgg II Case Study: Seti@Home Exploit Code Case Study: Microsoft CodeBlue Exploit Code The Complete Data Conversion Table Useful Syscalls Additional Exploit References


ISBN:

978-0-12-804456-8

OS X INCIDENT RESPONSE

Editorial: SYNGRESS   Año:   
Precio: 48,88
Añadir a la cesta


ISBN:

978-0-12-801275-8

SECURING SQL SERVER 3RD.EDITION

Editorial: SYNGRESS   Año:   
Precio: 45,71
Añadir a la cesta


ISBN:

978-0-12-419967-5

BUILDING AND INFORMATION SECURITY AWARENESS PROGRAM

Editorial: SYNGRESS   Año:   
Precio: 50,91
Añadir a la cesta


ISBN:

978-0-12-417159-6

THE BASICS OF IT AUDIT

Editorial: SYNGRESS   Año:   
Precio: 36,35
Añadir a la cesta


ISBN:

978-0-12-416688-2

Managing information security

Editorial: SYNGRESS   Año:   
Precio: 43,63
Añadir a la cesta


ISBN:

978-1-59749-305-5

Virtualization for security:including sandboxing

Editorial: SYNGRESS   Año:   
Precio: 50,91
Añadir a la cesta


ISBN:

978-1-59749-993-4

PROFESSIONAL PENETRATION TESTING.(2ND EDITION)

Editorial: SYNGRESS   Año:   
Precio: 72,75
Añadir a la cesta



[1-8]  

Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

Volver a Página Principal

Otras novedades


© Paquebote 1998-2024 Todas las secciones | Ayuda | Aviso Legal