Related Books
Language: en
Pages: 466
Pages: 466
Type: BOOK - Published: 2010-10-28 - Publisher: Elsevier
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exp
Language: en
Pages: 340
Pages: 340
Type: BOOK - Published: 2021-11-25 - Publisher: Packt Publishing Ltd
Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key FeaturesDiscover a range of t
Language: en
Pages: 354
Pages: 354
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Language: en
Pages: 521
Pages: 521
Type: BOOK - Published: 2005-01-29 - Publisher: Elsevier
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer
Language: en
Pages: 758
Pages: 758
Type: BOOK - Published: 2011-02-16 - Publisher: John Wiley & Sons
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security hole