| 000 | 00823camuu22002778a 4500 | |
| 001 | 000000886136 | |
| 005 | 20040629114006 | |
| 008 | 030801s2003 cau 001 0 eng | |
| 010 | ▼a 2003017498 | |
| 020 | ▼a 1593270070 | |
| 035 | ▼a KRIC09126401 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d 211009 | |
| 042 | ▼a pcc | |
| 049 | 1 | ▼l 121095906 ▼f 과학 |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b E75 2003 |
| 056 | ▼a 005.8 ▼2 4 | |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b H121 | |
| 245 | 1 0 | ▼a Hacking : ▼b the art of exploitation / ▼c Jon Erickson. |
| 260 | ▼a San Francisco : ▼b No Starch Press, ▼c c2003. | |
| 300 | ▼a xi, 241 p. ; ▼c 24cm. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Computer hackers. |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
| 700 | 1 | ▼a Erickson, Jon ▼q (Jon Mark) , ▼d 1977- |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 H121 | 등록번호 121095906 (17회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
정보제공 :
저자소개
목차
Introduction
Programming
Program Exploitation
Generalized Exploit Techniques
Multi-User File Permissions
Memory
Buffer Overflows
Stack based overflows
Heap and bss based overflows
Format Strings
Writing Shellcode
Return-into-libc
NETWORKING
Interesting Layers in Detail
Network Sniffing
TCP/IP Hijacking
Denial of Service
Port Scanning
CRYPTOLOGY
Information Theory
Algorithmic Runtime
Symmetric Encryption
Asymmetric Encryption
Hybrid Ciphers
Password Cracking
Wireless 802.11b Encryption
WEP Attacks
Conclusion
정보제공 :
