Coverart for item
The Resource Hacking : the art of exploitation, Jon Erickson, (electronic resource)

Hacking : the art of exploitation, Jon Erickson, (electronic resource)

Label
Hacking : the art of exploitation
Title
Hacking
Title remainder
the art of exploitation
Statement of responsibility
Jon Erickson
Creator
Subject
Genre
Language
eng
Summary
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits
Cataloging source
CCO
http://library.link/vocab/creatorDate
1977-
http://library.link/vocab/creatorName
Erickson, Jon
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
E75 2008eb
Literary form
non fiction
Nature of contents
  • standards specifications
  • bibliography
http://library.link/vocab/subjectName
  • Computer security
  • Hackers
  • Computer networks
  • Electronic books
  • Computer security
  • Computer hackers
  • Computer networks / Security measures
  • Computer security
  • Computer hackers
  • Computer networks / Security measures
Label
Hacking : the art of exploitation, Jon Erickson, (electronic resource)
Link
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource (x, 472 p.)
Form of item
online
Isbn
9781593271442
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
ill.
Specific material designation
remote
Stock number
4F68638D-38E2-439E-87DE-641EED535483
System control number
  • 2080325
  • (OCoLC)567957090
  • (OCoLC)ocn567957090
  • 2080325
Label
Hacking : the art of exploitation, Jon Erickson, (electronic resource)
Link
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource (x, 472 p.)
Form of item
online
Isbn
9781593271442
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
ill.
Specific material designation
remote
Stock number
4F68638D-38E2-439E-87DE-641EED535483
System control number
  • 2080325
  • (OCoLC)567957090
  • (OCoLC)ocn567957090
  • 2080325

Library Locations

  • Northwest LibraryBorrow it
    2280 Hard Rd, Columbus, OH, 43235, US
    40.118513 -83.076143
  • Old Worthington LibraryBorrow it
    820 High St, Worthington, OH, 43085, US
    40.090609 -83.016926
  • Worthington Park LibraryBorrow it
    1389 Worthington Centre Dr, Worthington, OH, 43085, US
    40.123032 -82.980439
Processing Feedback ...