Buffer Overflow Attacks
Автор:
James C. Foster, Vitaly Osipov, Nish Bhalla, 512 стр., ISBN:
1932266674
Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows, Heap Corruption, and Format String Bugs Provides Case Studies for ost Major Platforms and Environments, Including Windows, FreeBSD, FrontPage, and Linux Avoid Worm or Custom Exploits by Analyzing Your Source Code to Detect Buffer Overflow Vulnerabilities Forensic investigations of notorious Internet attcks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker's "vulnerability of choice". These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats hve appeared in the form of "custom exploits". These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal...
Под заказ: |
|
OZON.ru - 3587 руб.
|
Перейти
|
|
|
Рейтинг книги:



4 из 5,
3 голос(-ов).