intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Ebook Buffer overflow attacks

Xem 1-5 trên 5 kết quả Ebook Buffer overflow attacks
  • Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.

    pdf436p muasambanhan10 11-04-2024 5 1   Download

  • The first aim of this document is to present how buffer overflows work and may compromise a system or a network security, and to focus on some existing protection solutions. Finally, we will try to point out the most interesting sets to secure an environment, and compare them on criteria such as efficiency or performance loss.

    pdf102p haojiubujain010 14-12-2023 1 0   Download

  • Ebook Hack proofing your network internet tradecraft: Part 1 includes contents: Chapter 1: politics, chapter 2 laws of security, chapter 3: classes of attack, chapter 4: methodology, chapter 5: diffing, chapter 6: cryptography, chapter 7: unexpected input, chapter 8: buffer overflow.

    pdf293p haojiubujain06 05-09-2023 7 3   Download

  • Ebook \(CE{H^{TM}}\) - Certified ethical hacker (Study Guide) - Part 2 presents the following content: Chapter 9: attacking applications: SQL injection and buffer overflows; chapter 10: wireless network hacking; chapter 11: physical site security; chapter 12: hacking linux systems; chapter 13: bypassing network security: evading IDSs, honeypots, and firewalls; chapter 14: cryptography; chapter 15: performing a penetration test; Appendix: About the companion CD.

    pdf201p runthenight08 12-04-2023 11 5   Download

  • (bq) this book on buffer overflows can’t deliver that hacker high with knowledge alone. work along with the chapters and you’ll find that you can’t stop fiddling with your exploit when it’s not working right.you’ll give up food, sleep, or money to make it that much cleaner. my belief is this: in the end, an exploit is a complex statement of truth.

    pdf521p physicalfunny 29-08-2018 54 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2