Hacking

Hacking:TheArtofExploitation,2ndEdition

查阅电子书
手机扫码
  • 微信扫一扫

    关注微信公众号

因版权原因待上架

内容简介

While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. All sections have been extensively updated and expanded, including a more thorough introduction to the complex, low-level workings of a computer. Readers can easily follow along with example code by booting the included live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system.

作者简介

Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He works as a cryptologist and security specialist in Northern California.

Hacking是2008年由NoStarchPress出版,作者JonErickson。

得书感谢您对《Hacking》关注和支持,如本书内容有不良信息或侵权等情形的,请联系本网站。

购买这本书

你可能喜欢
Wireshark数据包分析实战(第3版) 电子书
Wireshark网络嗅探软件详解:2.0.5版IPv6及案例讲解。
龙芯自主可信计算及应用 电子书
本书适合从事相关专业的科研和工程技术人员阅读,也可作为计算机、通信、信息安全、密码学等专业的教学参考书。
白话网络安全 电子书
本书汇集了“大东话安全”团队多年从事网络安全科普活动的经验和成果。
软件调试(第2版)卷1:硬件基础 电子书
堪称是软件调试的“百科全书”,软件工程师的贴身宝典。
云计算服务保障体系 电子书
云计算是一种商业计算模型,它将计算任务分布在大量计算机构成的资源池上,使用户能够按需获取计算能力、存储空间和信息服务。与以往的计算模式不同,云计算环境下,信息安全和服务保障问题更严重、更突出。本书从云计算的安全技术和服务质量评价两个方面论述云计算服务保障的体系架构,安全技术方面主要阐述了基于可信计算的实时度量、基于角色的数据隔离访问、云节点信任链的动态维护模型与验证机制和多级安全访问控制模型;服务