HOME > 상세정보

상세정보

Hacking : the art of exploitation

Hacking : the art of exploitation (17회 대출)

자료유형
단행본
개인저자
Erickson, Jon (Jon Mark) , 1977-
서명 / 저자사항
Hacking : the art of exploitation / Jon Erickson.
발행사항
San Francisco :   No Starch Press,   c2003.  
형태사항
xi, 241 p. ; 24cm.
ISBN
1593270070
일반주제명
Computer security. Computer hackers. Computer networks -- Security measures.
000 00823camuu22002778a 4500
001 000000886136
005 20040629114006
008 030801s2003 cau 001 0 eng
010 ▼a 2003017498
020 ▼a 1593270070
035 ▼a KRIC09126401
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
049 1 ▼l 121095906 ▼f 과학
050 0 0 ▼a QA76.9.A25 ▼b E75 2003
056 ▼a 005.8 ▼2 4
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b H121
245 1 0 ▼a Hacking : ▼b the art of exploitation / ▼c Jon Erickson.
260 ▼a San Francisco : ▼b No Starch Press, ▼c c2003.
300 ▼a xi, 241 p. ; ▼c 24cm.
650 0 ▼a Computer security.
650 0 ▼a Computer hackers.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Erickson, Jon ▼q (Jon Mark) , ▼d 1977-

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 H121 등록번호 121095906 (17회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.


정보제공 : Aladin

저자소개

존 에릭슨(지은이)

컴퓨터 과학을 전공했으며 5살 때부터 해킹과 프로그래밍을 해왔다. 컴퓨터 보안 컨퍼런스에서 자주 발표하고, 세계 각국을 돌면서 보안 관련 교육을 한다. 현재는 북 캘리포니아에서 취약점 연구원 겸 보안 전문가로 일하고 있다.

정보제공 : Aladin

목차

Introduction

Programming
Program Exploitation
Generalized Exploit Techniques
Multi-User File Permissions
Memory
Buffer Overflows
Stack based overflows
Heap and bss based overflows
Format Strings
Writing Shellcode
Return-into-libc
NETWORKING
Interesting Layers in Detail
Network Sniffing
TCP/IP Hijacking
Denial of Service
Port Scanning
CRYPTOLOGY
Information Theory
Algorithmic Runtime
Symmetric Encryption
Asymmetric Encryption
Hybrid Ciphers
Password Cracking
Wireless 802.11b Encryption
WEP Attacks

Conclusion


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)