没有合适的资源?快使用搜索试试~ 我知道了~
A.Guide.to.Kernel.Exploitation.Attacking.the.Core
5星 · 超过95%的资源 需积分: 12 10 下载量 101 浏览量
2012-03-20
10:36:20
上传
评论
收藏 5.26MB PDF 举报
温馨提示
试读
465页
内容简介回到顶部↑ 《内核漏洞的利用与防范》系统地讲解内核级别漏洞利用所需的理论技术和方法,并将其应用于主流操作系统——unix家族、mac os x和 windows。本书分4个部分:第一部分介绍漏洞利用的目标、内核以及理论基础;第二部分深入介绍了目前主流操作系统的细节,并针对不同错误类别分别编写了漏洞利用程序。第三部分将关注点从本地场景转移到远程利用的情景;第四部分介绍未来内核的攻防模式。本书不仅从软件安全研究人员的角度谈论如何发现软件漏洞,也从软件开发者的角度给出了防止软件出现漏洞的方法,以帮助软件编程人员开发出安全的软件系统。 《内核漏洞的利用与防范》内容详实,实例丰富,可操作性强,涉及主流操作系统内核漏洞利用的各个方面,适合软件开发人员、测试人员、安全工程师等阅读。
资源推荐
资源详情
资源评论
A Guide to Kernel
Exploitation
This page intentionally left blank
A Guide to Kernel
Exploitation
Attacking the Core
Enrico Perla
Massimiliano Oldani
Technical Editor
Graham Speake
AMSTERDAM
•
BOSTON
•
HEIDELBERG
•
LONDON
NEW YORK
•
OXFORD
•
PARIS
•
SAN DIEGO
SAN FRANCISCO
•
SINGAPORE
•
SYDNEY
•
TOKYO
Syngress is an imprint of Elsevier
SYNGRESS
®
Acquiring Editor: Rachel Roumeliotis
Development Editor: Matthew Cater
Project Manager: Julie Ochs
Designer: Alisa Andreola
Syngress is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
© 2011 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information stor age and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, fur ther
information about the Publisher’s permissions policies and our arrangements with organizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our
website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods or professional practices, may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information or methods described herein. In using such information or methods they should be mindful
of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from
any use or operation of any methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication Data
Perla, Enrico.
A guide to kernel exploitation : attacking the core / Enrico Perla, Massimiliano Oldani.
p. cm.
Includes bibliographical references and index.
ISBN 978-1-59749-486-1 (pbk. : alk. paper)
1. Operating systems (Computers)—Security measures. 2. Computer security. I. Massimiliano,
Oldani. II. Title.
QA76.76.O63P5168 2010
005.8—dc22 2010027939
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
For information on all Syngress publications
visit our website at www.syngress.com
Printed in the United States of America
1011121314 10987654321
Typeset by: diacriTech, Chennai, India
剩余464页未读,继续阅读
资源评论
- shenxinshan6211072012-11-07全面介绍内核漏洞利用和防范的好书,原版,值得下载和收藏。
john213
- 粉丝: 4
- 资源: 30
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功