Author: Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin
Edition: 1
Binding: Paperback
ISBN: 1597494860
Edition: 1
Binding: Paperback
ISBN: 1597494860
A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Download A Guide to Kernel Exploitation: Attacking the Core from rapidshare, mediafire, 4shared. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Co Search and find a lot of computer books in many category availabe for free download.
A Guide to Kernel Exploitation Free
A Guide to Kernel Exploitation computer books for free. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target Co
Related education books
Reversing: Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth te
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation t
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security env
No comments:
Post a Comment