A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
"synopsis" may belong to another edition of this title.
Shipping:
£ 3.52
Within U.S.A.
Shipping:
£ 2.43
Within U.S.A.
Seller: CornerCoffeehouseBooks, Hopkinsville, KY, U.S.A.
paperback. Condition: Good. Seller Inventory # CCB1247
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!. Seller Inventory # S_374874773
Quantity: 1 available
Seller: Seattle Goodwill, Seattle, WA, U.S.A.
Condition: USED_GOOD. May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwills nonprofit mission!. Seller Inventory # 0KVOG2003LZJ_ns
Quantity: 1 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 11013168-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: As New. Used book that is in almost brand-new condition. Seller Inventory # 13866882-6
Quantity: 1 available
Seller: Goodwill of Silicon Valley, SAN JOSE, CA, U.S.A.
Condition: USED_GOOD. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Good condition! Any other included accessories are also in Good condition showing use. Use can included some highlighting and writing, page and cover creases as well as other types visible wear. Seller Inventory # GWSVV.1593270070.G
Quantity: 2 available
Seller: Books Unplugged, Amherst, NY, U.S.A.
Condition: USED_GOOD. Buy with confidence! Book is in good condition with minor wear to the pages, binding, and minor marks within 1.2. Seller Inventory # bk1593270070xvz189zvxgdd
Quantity: 1 available
Seller: Book Deals, Tucson, AZ, U.S.A.
Condition: USED_FAIR. Acceptable/Fair condition. Book is worn, but the pages are complete, and the text is legible. Has wear to binding and pages, may be ex-library. 1.2. Seller Inventory # 353-1593270070-acp
Quantity: 1 available
Seller: Ergodebooks, Houston, TX, U.S.A.
Softcover. Condition: Good. 1. A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. Seller Inventory # SONG1593270070
Quantity: 1 available
Seller: Irish Booksellers, Portland, ME, U.S.A.
Condition: Good. SHIPS FROM USA. Used books have different signs of use and do not include supplemental materials such as CDs, Dvds, Access Codes, charts or any other extra material. All used books might have various degrees of writing, highliting and wear and tear and possibly be an ex-library with the usual stickers and stamps. Dust Jackets are not guaranteed and when still present, they will have various degrees of tear and damage. All images are Stock Photos, not of the actual item. book. Seller Inventory # 1-1593270070-G
Quantity: 1 available