|En la categoría:
¿Quieres vender uno?

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

by Koziol, Jack; Litchfield,... | PB | Acceptable
ThriftBooks
(3952533)
Registrado como vendedor profesional
USD6,55
Aproximadamente5,59 EUR
Estado:
Aceptable
Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ... Más informaciónacerca del estado
3 disponibles1 vendido
Respira tranquilidad. Envíos y devoluciones gratis.
Otros usuarios han comprado esto. 1 ya se ha vendido.
Envío:
Gratis Economy Shipping.
Ubicado en: Aurora, Illinois, Estados Unidos
Entrega:
Entrega prevista entre el vie. 29 ago. y el vie. 5 sep. a 94104
Las fechas previstas de entrega (se abre en una nueva ventana o pestaña) incluyen el tiempo de manipulación del vendedor, el código postal de origen, el código postal de destino y la hora de aceptación, y dependen del servicio de envío seleccionado y de que el pago se haya hecho efectivoel pago se haya hecho efectivo (se abre en una nueva ventana o pestaña). Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El vendedor paga el envío de la devolución.
Pagos:
    Diners Club

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. Más informaciónGarantía al cliente de eBay - se abre en una nueva ventana o pestaña
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:146241410318
Última actualización el 19 ago 2025 02:20:26 H.EspVer todas las actualizacionesVer todas las actualizaciones

Características del artículo

Estado
Aceptable
Libro con un desgaste evidente. La tapa puede tener algunos desperfectos, pero el libro está entero. La encuadernación puede estar ligeramente deteriorada, pero mantiene su integridad. Es posible que tenga anotaciones en los márgenes, texto subrayado o resaltado, pero conserva todas las páginas y no tiene ningún desperfecto que dificulte su lectura o comprensión. Consulta el anuncio del vendedor para obtener más información y la descripción de cualquier posible imperfección. Ver todas las definiciones de estadose abre en una nueva ventana o pestaña
Notas del vendedor
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ...
Binding
Paperback
Book Title
The Shellcoder's Handbook
Weight
2 lbs
Product Group
Book
IsTextBook
Yes
ISBN
9780764544682

Acerca de este producto

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0764544683
ISBN-13
9780764544682
eBay Product ID (ePID)
5960347

Product Key Features

Number of Pages
644 Pages
Publication Name
Shellcoder's Handbook : Discovering and Exploiting Security Holes
Language
English
Publication Year
2004
Subject
Security / General
Type
Textbook
Subject Area
Computers
Author
David Litchfield, Jack koziol, Sinan Noir Eren, Chris Anley, Dave Aitel
Format
Trade Paperback

Dimensions

Item Height
1.4 in
Item Weight
34.3 Oz
Item Length
9.3 in
Item Width
7.5 in

Additional Product Features

Intended Audience
Trade
LCCN
2003-027629
Reviews
"...80%...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed..." ( PC Utilities , July 2004) "...essential for administrators who want to secure computer systems under their management..." ( Computer Weekly , March 2004) "...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
TitleLeading
The
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
About the Authors.Credits.Acknowledgments.Part 1: Introduction to Exploitation: Linux on x86.Chapter 1: Before You Begin.Chapter 2: Stack Overflows.Chapter 3: Shellcode.Chapter 4: Introduction to Format String Bugs.Chapter 5: Introduction to Heap Overflows.Part 2: Exploiting More Platforms: Windows, Solaris, and Tru64.Chapter 6: The Wild World of Windows.Chapter 7: Windows Shellcode.Chapter 8: Windows Overflows.Chapter 9: Overcoming Filters.Chapter 10: Introduction to Solaris Exploitation.Chapter 11: Advanced Solaris Exploitation.Chapter 12: HP Tru64 Unix Exploitation.Part 3: Vulnerability Discovery.Chapter 13: Establishing a Working Environment.Chapter 14: Fault Injection.Chapter 15: The Art of Fuzzing.Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages.Chapter 17: Instrumented Investigation: A Manual Approach.Chapter 18: Tracing for Vulnerabilities.Chapter 19: Binary Auditing: Hacking Closed Source Software.Part 4: Advanced Materials.Chapter 20: Alternative Payload Strategies.Chapter 21: Writing Exploits that Work in the Wild.Chapter 22: Attacking Database Software.Chapter 23: Kernel Overflows.Chapter 24: Exploiting Kernel Vulnerabilities.Index.
Synopsis
Uncover, exploit, and close security holes in any software or operating systemEvery day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, youa'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed."The Shellcodera's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows r , Linux r , and Solaris TM ) and applications (including MS SQL Server and Oracle r databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniques, Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
LC Classification Number
QA76.9.A25

Descripción del artículo del vendedor

Información de vendedor profesional

Certifico que todas mis actividades de venta cumplirán todas las leyes y reglamentos de la UE.
Acerca de este vendedor

ThriftBooks

98,9% de votos positivos19,8 millones artículos vendidos

Se unió el mar 2015
Registrado como vendedor profesional
Just Voted on Newsweek - ThriftBooks ranks #1 America's Best Online Shops 2025 in Office, Electronics & Media sector, Media category!!ThriftBooks is a fully independent seller of used books, having ...
Ver más
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses
Descripción precisa
4.9
Gastos de envío razonables
5.0
Rapidez de envío
5.0
Comunicación
4.9

Votos de vendedor (5.714.043)

Todas las valoraciones
Positivas
Neutras
Negativas
    • v***o (229)- Votos emitidos por el comprador.
      Mes pasado
      Compra verificada
      Great quality book
    Ver todos los votos