000 nam a22 7a 4500
999 _c29300
_d29300
008 190205b xxu||||| |||| 00| 0 eng d
020 _a9781597494861
082 _a005.8
_bPER
100 _aPerla, Enrico
245 _aA guide to kernel exploitation : attacking the core
260 _aBurlington, MA :
_bSyngress,
_c2010
300 _axxi, 442p.
_c24 cm.
365 _aUSD
_b52.95
504 _aIncludes bibliographical references and index.
520 _aA very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise.
650 _aOperating systems - Security measures
650 _aComputer security
650 _aInternet - Security
650 _aComputers - Networking - Security
700 _aMassimiliano, Oldani
942 _2ddc
_cBK