The shellcoder's handbook discovering and exploiting security holes

"Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page

Bibliographic Details
Main Author: Koziol, Jack
Format: eBook
Language:English
Published: Indianapolis, Ind. Wiley Pub. 2004
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 01883nmm a2200433 u 4500
001 EB001951251
003 EBX01000000000000001114153
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0764544683 
020 |a 9780764544682 
050 4 |a QA76.9.A25 
100 1 |a Koziol, Jack 
245 0 0 |a The shellcoder's handbook  |b discovering and exploiting security holes  |c Jack Koziol [and others] 
260 |a Indianapolis, Ind.  |b Wiley Pub.  |c 2004 
300 |a xxiii, 620 pages  |b illustrations 
653 |a risk assessment / aat 
653 |a Computer security 
653 |a Sécurité informatique 
653 |a Data protection / fast 
653 |a Évaluation du risque 
653 |a Data protection / http://id.loc.gov/authorities/subjects/sh85035859 
653 |a Risk assessment / http://id.loc.gov/authorities/subjects/sh87002638 
653 |a Risk Assessment 
653 |a Risk assessment / fast 
653 |a Computer security / fast 
653 |a Computer Security 
653 |a Protection de l'information (Informatique) 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 
500 |a May be limited to subscribing institutions 
776 |z 9780764544682 
776 |z 9780764544682 
776 |z 0764544683 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780764544682/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a "Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again."--Resource description page