Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Boston, Mass. :Safari Books Online  (4)
  • [Place of publication not identified] : Apress
  • Electronic books ; local  (4)
  • Konferenzschrift
  • Computer Science  (4)
Datasource
Material
Language
Years
Subjects(RVK)
  • Computer Science  (4)
  • 1
    Online Resource
    Online Resource
    San Francisco, Calif. : No Starch Press | Boston, Mass. :Safari Books Online
    ISBN: 9781593271442 , 1593271441
    Language: English
    Pages: x, 472 p , ill. , 23 cm. +
    Edition: 2nd ed.
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Computer hackers ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    San Francisco : No Starch Press | Boston, Mass. :Safari Books Online
    ISBN: 9781593271657 , 1593271654
    Language: English
    Pages: xix, 159 p , ill. , 24 cm
    DDC: 005.8
    RVK:
    Keywords: OpenBSD (Electronic resource) ; TCP/IP (Computer network protocol) ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules. Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to: Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions Maximize availability by using redirection rules for load balancing and CARP for failover Use tables for proactive defense against would-be attackers and spammers Set up queues and traffic shaping with ALTQ, so your network stays responsive Master your logs with monitoring and visualization, because you can never be too paranoid The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.
    Note: Includes bibliographical references (p. 136-140) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    San Francisco : No Starch Press | Boston, Mass. :Safari Books Online
    ISBN: 9781593271510 , 1593271514
    Language: English
    Pages: xxx, 709 p , ill. , 24 cm
    Edition: 2nd ed.
    DDC: 004/.36
    RVK:
    Keywords: FreeBSD ; UNIX (Computer file) ; Internet service providers ; Computer programs ; Web servers ; Computer programs ; Client/server computing ; Electronic books ; local
    Abstract: FreeBSD-the powerful, flexible, and free Unix-like operatingsystem-is the preferred server for many enterprises. But it can beeven trickier to use than either Unix or Linux, and harder still tomaster. Absolute FreeBSD, 2nd Edition is your complete guide toFreeBSD, written by FreeBSD committer Michael W. Lucas. Lucasconsiders this completely revised and rewritten second edition ofhis landmark work to be his best work ever; a true product of hislove for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation,networking, security, network services, system performance, kerneltweaking, filesystems, SMP, upgrading, crash debugging, and muchmore, including coverage of how to: Use advanced security features like packet filtering, virtualmachines, and host-based intrusion detection Build custom live FreeBSD CDs and bootable flash Manage network services and filesystems Use DNS and set up email, IMAP, web, and FTP services for bothservers and clients Monitor your system with performance-testing andtroubleshooting tools Run diskless systems Manage schedulers, remap shared libraries, and optimize yoursystem for your hardware and your workload Build custom network appliances with embedded FreeBSD Implement redundant disks, even without special hardware Integrate FreeBSD-specific SNMP into your network managementsystem. Whether you're just getting started with FreeBSD or you've beenusing it for years, you'll find this book to be the definitiveguide to FreeBSD that you've been waiting for.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Indianapolis, Ind. : Wiley | Boston, Mass. :Safari Books Online
    ISBN: 9780764598371 , 0764598376
    Language: English
    Pages: xxvii, 973 p , ill. , 25 cm. +
    Edition: 3rd ed.
    DDC: 005.1/4
    RVK:
    Keywords: Computer software ; Testing ; CD-ROMs ; Electronic books ; local ; Checkliste
    Abstract: Accompanying CD-ROM contains ... "work papers and quality control checklists your organization needs to implement an effective software testing process."--P. [4] of cover.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...