Ebooks

Hacking The Art of Exploitation 2nd Ed~tqw~ darksiderg


  • Rate this torrent +  |  -

Torrent info

Name:Hacking The Art of Exploitation 2nd Ed~tqw~ darksiderg torrent

Total Size: 4.68 MB

Seeds: 0

Leechers: 0

Downloaded: 38

Torrent added: 2009-08-20 23:31:58

Share:Bookmark and Share



Torrent Files List


Hacking The Art of Exploitation 2nd Ed~tqw~ darksiderg (Size: 4.68 MB) (Files: 3)

 tracked_by_h33t_com.txt

0.02 KB

 Hacking The Art of Exploitation 2nd Ed~tqw~_darksiderg.nfo

2.95 KB

 Hacking The Art of Exploitation 2nd Ed~tqw~_darksiderg.chm

4.67 MB
 

Torrent description

*******************************************************************************
Hacking: The Art of Exploitation 2nd Ed.
*******************************************************************************

-------------------------------------------------------------------------------
General Information
-------------------------------------------------------------------------------
Type.................: Ebook
Part Size............: 4,900,023 bytes




-------------------------------------------------------------------------------
Post Information
-------------------------------------------------------------------------------
Posted by............: ~tqw~

-------------------------------------------------------------------------------
Release Notes
-------------------------------------------------------------------------------
Are you a true hacker in the name of the word? If you are, then this book is for
you. Author Jon Erickson, has done an outstanding job of writing a second
edition of a book that shows you the true spirit of hacking. Erickson, begins
with an explanation of how programs can be exploited. Then, the author discusses
the less obvious errors that have given birth to more complex exploit techniques
that can be applied in many different places. Next, he shows you how to network
your applications by using sockets and how to deal with common network
vulnerabilities. The author also discusses how writing shellcode develops
assembly language skills and employs a number of hacking techniques worth
knowing. He continues by showing you why defensive countermeasures can be
separated into two groups: Those that try to detect the attack and those that
try to protect the vulnerability. Finally, the author discusses why cryptology
is relevant to hacking in a number of ways. This most excellent book has
explained some of the basic techniques of hacking. But, more importantly, the
book looked at various hacker techniques, from the past to the present, and
dissected them to learn how and why they work.


Table of Contents

HACKING: THE ART OF EXPLOITATION, 2ND EDITION.
ACKNOWLEDGMENTS
PREFACE
Chapter 0x100: Introduction
Chapter 0x200: Programming
Chapter 0x300: Exploitation
Chapter 0x400: Networking
Chapter 0x500: Shellcode
Chapter 0x600: Countermeasures
Chapter 0x700: Cryptography
Chapter 0x800: Conclusion

Product Details

* ISBN: 1593271441
* ISBN-13: 9781593271442
* Format: Paperback, 488pp
* Publisher: No Starch Press San Francisco, CA
* Pub. Date: February 2008

-------------------------------------------------------------------------------
Install Notes
-------------------------------------------------------------------------------
CHM Reader

related torrents

Torrent name

Size

Main Menu