The Resource Hacking : the art of exploitation, Jon Erickson
Hacking : the art of exploitation, Jon Erickson
Resource Information
The item Hacking : the art of exploitation, Jon Erickson represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Hacking : the art of exploitation, Jon Erickson represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits
- Language
- eng
- Edition
- 2nd ed.
- Extent
- 1 online resource (x, 472 pages)
- Contents
-
- 1. Introduction
- 2. Programming
- 3. Exploitation
- 4. Networking
- 5. Shellcode
- 6. Countermeasures
- 7. Cryptology
- 8. Conclusion
- Isbn
- 9781593273385
- Label
- Hacking : the art of exploitation
- Title
- Hacking
- Title remainder
- the art of exploitation
- Statement of responsibility
- Jon Erickson
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer hackers
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Hackers
- Hackers
- Security
- Computer security
- Databrott
- Datasäkerhet
- Electronic books
- Language
- eng
- Summary
- Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits
- Cataloging source
- CCO
- http://library.link/vocab/creatorDate
- 1977-
- http://library.link/vocab/creatorName
- Erickson, Jon
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- E75 2008eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/subjectName
-
- Computer security
- Hackers
- Computer networks
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer security
- Computer hackers
- Computer networks
- Hackers
- Computer networks
- Computer security
- Databrott
- Datasäkerhet
- Label
- Hacking : the art of exploitation, Jon Erickson
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- 1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion
- Control code
- 567957090
- Dimensions
- unknown
- Edition
- 2nd ed.
- Extent
- 1 online resource (x, 472 pages)
- Form of item
- online
- Isbn
- 9781593273385
- Lccn
- 2007042910
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 9781593271442
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
-
- cl0500000020
- 4f68638d-38e2-439e-87de-641eed535483
- Specific material designation
- remote
- System control number
- (OCoLC)567957090
- Label
- Hacking : the art of exploitation, Jon Erickson
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- 1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion
- Control code
- 567957090
- Dimensions
- unknown
- Edition
- 2nd ed.
- Extent
- 1 online resource (x, 472 pages)
- Form of item
- online
- Isbn
- 9781593273385
- Lccn
- 2007042910
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 9781593271442
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
-
- cl0500000020
- 4f68638d-38e2-439e-87de-641eed535483
- Specific material designation
- remote
- System control number
- (OCoLC)567957090
Subject
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer hackers
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Hackers
- Hackers
- Security
- Computer security
- Databrott
- Datasäkerhet
- Electronic books
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Hacking--the-art-of-exploitation-Jon/0zkiyIKavF4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Hacking--the-art-of-exploitation-Jon/0zkiyIKavF4/">Hacking : the art of exploitation, Jon Erickson</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Hacking : the art of exploitation, Jon Erickson
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Hacking--the-art-of-exploitation-Jon/0zkiyIKavF4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Hacking--the-art-of-exploitation-Jon/0zkiyIKavF4/">Hacking : the art of exploitation, Jon Erickson</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>