|刊登類別:
有類似物品要出售?

Enrico Perla Massimiliano Oldani A Guide to Kernel Exploitation (Paperback)

Another great item from Rarewaves USA | Free delivery!
狀況:
全新
庫存 2 件
價格:
C $92.77
大約HK$ 531.24
運費:
不運送到:美國. 查看詳情— 運送
所在地:60502, 美國
送達日期:
視情況而定
退貨:
30 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

安心購物

高度評價賣家
值得信賴的賣家,發貨快,輕鬆退貨。 

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:235295040133
上次更新時間: 2024-05-25 00:20:36查看所有版本查看所有版本

物品細節

物品狀況
全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
Book Title
A Guide to Kernel Exploitation
Publication Name
A Guide to Kernel Exploitation
Title
A Guide to Kernel Exploitation
Subtitle
Attacking the Core
Author
Enrico Perla, Massimiliano Oldani
Format
Trade Paperback
EAN
9781597494861
ISBN
9781597494861
Publisher
Elsevier Science & Technology Books
Genre
Computers, Business & Economics
Release Date
28/10/2010
Release Year
2010
Language
English
Country/Region of Manufacture
US
Item Height
235mm
Item Length
9.2in
Item Weight
820g
Publication Year
2010
Type
Textbook
Topic
Operating Systems / General, Security / General, Information Management
Item Width
7.5in
Number of Pages
464 Pages

關於產品

Product Information

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.

Product Identifiers

Publisher
Elsevier Science & Technology Books
ISBN-10
1597494860
ISBN-13
9781597494861
eBay Product ID (ePID)
77880289

Product Key Features

Author
Enrico Perla, Massimiliano Oldani
Format
Trade Paperback
Language
English
Topic
Operating Systems / General, Security / General, Information Management
Publication Year
2010
Type
Textbook
Genre
Computers, Business & Economics
Number of Pages
464 Pages

Dimensions

Item Length
9.2in
Item Width
7.5in

Additional Product Features

Reviews
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."-- Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC, "A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC
Publication Name
Guide to Kernel Exploitation : Attacking the Core
Table of Content
Part I: A Journey to Kernel-Land 1. From User-Land to Kernel-Land Attacks 2. A Taxonomy of Kernel Vulnerabilities 3. Stairway to Successful Kernel Exploitation Part II: The UNIX Family, Mac OS X, and Windows 4. The UNIX Family 5. Mac OS X 6. Windows Part III: Remote Kernel Exploitation 7. Facing the Challenges of Remote Kernel Exploitation 8. Putting It All Together: A Linux Case Study Part IV: Final Words 9. Kernel Evolution: Future Forms of Attack and Defense
Copyright Date
2011
Target Audience
Scholarly & Professional
Dewey Decimal
005.8
Dewey Edition
22

賣家提供的物品說明

Rarewaves USA CA

Rarewaves USA CA

97.7% 正面信用評價
已賣出 17.45 萬 件物品
瀏覽商店聯絡

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.9
運費合理
5.0
運送速度
4.9
溝通
4.9

賣家信用評價 (63,036)

-***- (758)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Perfect
e***e (1)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Great service, fast and easy shipping! I strongly recommend them, even for Canadian customers.
r***k (46)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Condition as described, good shipping speed!