The Resource Buffer overflow attacks : detect, exploit, prevent, James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen, (electronic resource)

Buffer overflow attacks : detect, exploit, prevent, James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen, (electronic resource)

Label
Buffer overflow attacks : detect, exploit, prevent
Title
Buffer overflow attacks
Title remainder
detect, exploit, prevent
Statement of responsibility
James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen
Creator
Contributor
Subject
Genre
Language
  • eng
  • eng
Summary
The SANS Institute maintains a list of the ""Top 10 Software Vulnerabilities."" At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of th
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Foster, James C
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.A25
LC item number
F67 2005
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Bhalla, Nish
  • Heinen, Neils
  • Osipov, Vitaly
http://library.link/vocab/subjectName
  • Computer networks
  • Computer security
Label
Buffer overflow attacks : detect, exploit, prevent, James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Cover; Contents; Foreword; Chapter 1 Buffer Overflows: The Essentials; Chapter 2 Understanding Shellcode; Chapter 3 Writing Shellcode; Chapter 4 Win32 Assembly; Section 1 Case Studies Case Study 1.1 FreeBSD NN Exploit Code; Chapter 5 Stack Overflows; Chapter 6 Heap Corruption; Chapter 7 Format String Attacks; Chapter 8 Windows Buffer Overflows; Section 2 Case Studies Case Study 2.1 cURL Buffer Overflow on Linux; Chapter 9 Finding Buffer Overflows in Source; Section 3 Case Studies Case Study 3.1 InlineEgg I; Appendix A The Complete Data Conversion Table; Appendix B Useful Syscalls; Index
Dimensions
unknown
Extent
1 online resource (521 p.)
Form of item
online
Isbn
9780080488424
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)222803
  • (OCoLC)780935122
  • (SSID)ssj0000073862
  • (PQKBManifestationID)11110662
  • (PQKBTitleCode)TC0000073862
  • (PQKBWorkID)10118482
  • (PQKB)11623993
  • (MiAaPQ)EBC222803
  • (EXLCZ)991000000000026751
Label
Buffer overflow attacks : detect, exploit, prevent, James C. Foster, Vitaly Osipov, Nish Bhalla, Neils Heinen, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Cover; Contents; Foreword; Chapter 1 Buffer Overflows: The Essentials; Chapter 2 Understanding Shellcode; Chapter 3 Writing Shellcode; Chapter 4 Win32 Assembly; Section 1 Case Studies Case Study 1.1 FreeBSD NN Exploit Code; Chapter 5 Stack Overflows; Chapter 6 Heap Corruption; Chapter 7 Format String Attacks; Chapter 8 Windows Buffer Overflows; Section 2 Case Studies Case Study 2.1 cURL Buffer Overflow on Linux; Chapter 9 Finding Buffer Overflows in Source; Section 3 Case Studies Case Study 3.1 InlineEgg I; Appendix A The Complete Data Conversion Table; Appendix B Useful Syscalls; Index
Dimensions
unknown
Extent
1 online resource (521 p.)
Form of item
online
Isbn
9780080488424
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)222803
  • (OCoLC)780935122
  • (SSID)ssj0000073862
  • (PQKBManifestationID)11110662
  • (PQKBTitleCode)TC0000073862
  • (PQKBWorkID)10118482
  • (PQKB)11623993
  • (MiAaPQ)EBC222803
  • (EXLCZ)991000000000026751

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...