Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
Books | 005.8 PER (Browse shelf) | Available | 031750 |
Includes bibliographical references and index.
A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise.
There are no comments for this item.