WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/181432963

Hacking the art of exploitation

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "Umění exploitace - Hacking"
  • "Hacking - umění exploitace"

http://schema.org/description

  • "Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits."@en
  • "Détaille le mode opératoire des techniques de hacking et présente les bases de la programmation en C du point de vue du hacker pour comprendre l'art et la science du hacking--[Memento]."
  • "A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b."@en

http://schema.org/genre

  • "Ressources internet"
  • "Livres électroniques"
  • "Computer network resources"@en
  • "Příručky"
  • "Electronic books"
  • "Electronic books"@en
  • "Handbooks, manuals, etc"

http://schema.org/name

  • "Hacking the art of exploitation"@en
  • "Hacking the art of exploitation"
  • "Forbidden code"
  • "Hacking - umění exploitace"
  • "Hacking : the art of exploitation"
  • "Forbidden Code"
  • "Forbidden code : [jedes System ist zu knacken! Jedes!!!]"
  • "Techniques de hacking"
  • "Hacking : umění exploitace"
  • "Hacking : de kunst van het uitbuiten"
  • "Hacking técnicas fundamentales"@es
  • "Hacking : técnicas fundamentales"@es

http://schema.org/workExample