買這商品的人也買了...
-
$1,100$1,078 -
$580$493 -
$440$348 -
$1,300$1,235 -
$880$695 -
$980$774 -
$320$288 -
$580$493 -
$680$537 -
$880$695 -
$650$514 -
$990Cross Site Scripting Attacks: Xss Exploits and Defense
-
$600$480 -
$580$493 -
$860$774 -
$480$379 -
$950$751 -
$1,881$1,782 -
$580$522 -
$580$493 -
$420$332 -
$1,200CISSP All-in-One Exam Guide, 6/e (Hardcover)
-
$580$452 -
$400$380 -
$690$538
相關主題
商品描述
Description
- This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
- New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
- Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
- The companion Web site features downloadable code files
Table of Contents
About the Authors.Acknowledgments.
Introduction to the Second Edition.
Part I: Introduction to Exploitation: Linux on x86.
Chapter 1: Before You Begin.
Chapter 2: Stack Overflows.
Chapter 3: Shellcode.
Chapter 4: Introduction to Format String Bugs.
Chapter 5: Introduction to Heap Overflows.
Part II: Other Platforms—Windows, Solaris, OS/X, and Cisco.
Chapter 6: The Wild World of Windows.
Chapter 7: Windows Shellcode.
Chapter 8: Windows Overflows.
Chapter 9: Overcoming Filters.
Chapter 10: Introduction to Solaris Exploitation.
Chapter 11: Advanced Solaris Exploitation.
Chapter 12: OS X Shellcode.
Chapter 13: Cisco IOS Exploitation.
Chapter 14: Protection Mechanisms.
Part III: Vulnerability Discovery.
Chapter 15: Establishing a Working Environment.
Chapter 16: Fault Injection.
Chapter 17: The Art of Fuzzing.
Chapter 18: Source Code Auditing: Finding Vulnerabilities in C-Based Languages.
Chapter 19: Instrumented Investigation: A Manual Approach.
Chapter 20: Tracing for Vulnerabilities.
Chapter 21: Binary Auditing: Hacking Closed Source Software.
Part IV: Advanced Materials.
Chapter 22: Alternative Payload Strategies.
Chapter 23: Writing Exploits that Work in the Wild.
Chapter 24: Attacking Database Software.
Chapter 25: Unix Kernel Overflows.
Chapter 26: Exploiting Unix Kernel Vulnerabilities.
Chapter 27: Hacking the Windows Kernel.
Index.
商品描述(中文翻譯)
描述
這本備受期待的修訂版由世界上頂尖的安全專家撰寫,新增了40%的內容,介紹如何在任何作業系統或應用程式中找到安全漏洞。
新的內容涵蓋了自第一版以來發現的許多新的攻擊技術,包括對“無法破解”的軟體套件(如McAfee的Entercept、Mac OS X、XP、Office 2003和Vista)進行攻擊。
此外,本書還首次發布了有關如何利用Cisco的IOS的資訊,這是以前從未探索過的內容。
附帶的網站提供可下載的程式碼檔案。
目錄
關於作者。
致謝。
第二版介紹。
第一部分:入門:Linux在x86上。
第1章:開始之前。
第2章:堆疊溢位。
第3章:Shellcode。
第4章:格式字串漏洞介紹。
第5章:堆溢位介紹。
第二部分:其他平台- Windows、Solaris、OS/X和Cisco。
第6章:Windows的狂野世界。
第7章:Windows的Shellcode。
第8章:Windows的溢位。
第9章:克服過濾器。
第10章:Solaris的入侵介紹。
第11章:高級Solaris的入侵。
第12章:OS X的Shellcode。
第13章:Cisco IOS的入侵。
第14章:保護機制。
第三部分:漏洞發現。
第15章:建立工作環境。
第16章:故障注入。
第17章:模糊測試的藝術。
第18章:源代碼審計:在基於C的語言中尋找漏洞。
第19章:儀器化調查:手動方法。
第20章:追蹤漏洞。
第21章:二進制審計:黑客技巧。