000 | nam a22 7a 4500 | ||
---|---|---|---|
999 |
_c29300 _d29300 |
||
008 | 190205b xxu||||| |||| 00| 0 eng d | ||
020 | _a9781597494861 | ||
082 |
_a005.8 _bPER |
||
100 | _aPerla, Enrico | ||
245 | _aA guide to kernel exploitation : attacking the core | ||
260 |
_aBurlington, MA : _bSyngress, _c2010 |
||
300 |
_axxi, 442p. _c24 cm. |
||
365 |
_aUSD _b52.95 |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aA very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. | ||
650 | _aOperating systems - Security measures | ||
650 | _aComputer security | ||
650 | _aInternet - Security | ||
650 | _aComputers - Networking - Security | ||
700 | _aMassimiliano, Oldani | ||
942 |
_2ddc _cBK |