没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and Exploitation 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
资源推荐
资源详情
资源评论
ATTACKING NETWORK PROTOCOLS
A Hacker’s Guide to Capture, Analysis, and Exploitation
by James Forshaw
San Francisco
ATTACKING NETWORK PROTOCOLS. Copyright © 2018 by James Forshaw.
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written
permission of the copyright owner and the publisher.
ISBN-10: 1-59327-750-4
ISBN-13: 978-1-59327-750-5
Publisher: William Pollock
Production Editor: Laurel Chun
Cover Illustration: Garry Booth
Interior Design: Octopod Studios
Developmental Editors: Liz Chadwick and William Pollock
Technical Reviewers: Cliff Janzen
Additional Technical Reviewers: Arrigo Triulzi and Peter Gutmann
Copyeditor: Anne Marie Walker
Compositors: Laurel Chun and Meg Sneeringer
Proofreader: Paula L. Fleming
Indexer: BIM Creatives, LLC
For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 1.415.863.9900; info@nostarch.com
www.nostarch.com
Library of Congress Control Number: 2017954429
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and
company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol
with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the
trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in
the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity
with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.
About the Author
James Forshaw is a renowned computer security researcher at Google Project Zero, with
more than ten years of experience in analyzing and exploiting application network
protocols. His skills range from cracking game consoles to exposing complex design issues
in operating systems, especially Microsoft Windows, which earned him the top bug bounty
of $100,000 and placed him as the #1 researcher on Microsoft Security Response Center’s
(MSRC) published list. He’s the creator of the network protocol analysis tool, Canape,
which was developed from his years of experience. He’s been invited to present his novel
security research at global security conferences such as BlackHat, CanSecWest and Chaos
Computer Congress.
About the Technical Reviewer
Since the early days of Commodore PET and VIC-20, technology has been a constant
companion (and sometimes an obsession!) to Cliff Janzen. Cliff discovered his career
passion when he moved to information security in 2008 after a decade of IT operations.
Since then, Cliff has had the great fortune to work with and learn from some of the best
people in the industry, including Mr. Forshaw and the fine people at No Starch during the
production of this book. He is happily employed as a security consultant, doing everything
from policy review to penetration tests. He feels lucky to have a career that is also his
favorite hobby and a wife who supports him.
剩余379页未读,继续阅读
资源评论
- weixin_404728042018-04-20不错,安全分析角度变换学习一下
- linix9992018-11-05书还可以的
- ffs20082019-01-25不错,安全分析角度变换学习一下
yinkaisheng-nj
- 粉丝: 763
- 资源: 6231
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- yolox_cfp_s.pth
- CFAR-radar-algorithm-MATLAB-GUI-master.zip
- I2 Localization v2.8.22 f4
- 盒子检测13-YOLO(v5至v11)、COCO、CreateML、Paligemma、TFRecord、VOC数据集合集.rar
- 大黄蜂塔防.exe大黄蜂塔防1.exe大黄蜂塔防2.exe
- 2024大模型在金融行业的落地探索.pptx
- 盒子检测49-YOLO(v5至v9)、COCO、CreateML、Darknet、Paligemma、TFRecord数据集合集.rar
- IMG_20241224_190113.jpg
- 【安卓源代码】奶牛管理新加功能(完整前后端+mysql+说明文档).zip
- 【安卓源代码】群养猪生长状态远程监测(完整前后端+mysql+说明文档).zip
- 基于分治法的快速排序算法设计与分析报告
- 糖果店冲击.exe糖果店冲击1.exe糖果店冲击2.exe
- 目标靶子检测29-YOLO(v5至v9)、COCO、CreateML、Paligemma、TFRecord数据集合集.rar
- MATLAB优化工具箱使用教程
- simulink-master.zip
- 硬币、塑料、瓶子检测13-YOLO(v7至v11)、COCO、CreateML、Paligemma、TFRecord、VOC数据集合集.rar
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功