000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190205b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781597494861 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
PER |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Perla, Enrico |
245 ## - TITLE STATEMENT |
Title |
A guide to kernel exploitation : attacking the core |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Burlington, MA : |
Name of publisher, distributor, etc |
Syngress, |
Date of publication, distribution, etc |
2010 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 442p. |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
USD |
Price amount |
52.95 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Operating systems - Security measures |
|
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Internet - Security |
|
Topical term or geographic name as entry element |
Computers - Networking - Security |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Massimiliano, Oldani |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |