Normal view MARC view ISBD view

A guide to kernel exploitation : attacking the core

By: Perla, Enrico.
Contributor(s): Massimiliano, Oldani.
Material type: materialTypeLabelBookPublisher: Burlington, MA : Syngress, 2010Description: xxi, 442p. 24 cm.ISBN: 9781597494861.Subject(s): Operating systems - Security measures | Computer security | Internet - Security | Computers - Networking - SecurityDDC classification: 005.8 Summary: A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references and index.

A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha