Thursday 14 October 2010

A Guide to Kernel Exploitation

A Guide to Kernel Exploitation
Author: Enrico Perla
Edition: 1
Binding: Kindle Edition
ISBN: B004FGMSFK



A Guide to Kernel Exploitation: Attacking the Core


The number of security countermeasures against user-land exploitation is on the rise. Download A Guide to Kernel Exploitation: Attacking the Core from rapidshare, mediafire, 4shared. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Co Search and find a lot of computer books in many category availabe for free download.

download

A Guide to Kernel Exploitation Free


A Guide to Kernel Exploitation computer books for free. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target Co

Related education books


Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.
For those who want to stay ahead of the late

Metasploit: The Penetration Tester's Guide


"The best guide to the Metasploit Framework."
-HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is u

Nmap Cookbook: The Fat-free Guide to Network Scanning


Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identif

Windows® Internals, Part 1


Delve inside Windows architecture and internals-and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is fully updated for Windows 7 and Windows Server 2008 R2-and now presents its coverag

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


"This is one of the most interesting infosec books to come out in the last several years."
-Dino Dai Zovi, Information Security Professional
"Give a man an exploit and you make him a hacker for a day; teach a man to explo

No comments:

Post a Comment