Writing security tools and exploits: [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code]
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
2006
|
Beschreibung: | XXIV, 638 S. Ill. |
ISBN: | 1597499978 9781597499972 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV024617262 | ||
003 | DE-604 | ||
005 | 20090910 | ||
007 | t | ||
008 | 090924s2006 a||| |||| 00||| eng d | ||
020 | |a 1597499978 |9 1-597-49997-8 | ||
020 | |a 9781597499972 |9 978-1-597-49997-2 | ||
035 | |a (OCoLC)255044007 | ||
035 | |a (DE-599)GBV510570801 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Foster, James C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Writing security tools and exploits |b [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] |c James C. Foster ; Vincent Liu |
264 | 1 | |a Rockland, Mass. |b Syngress |c 2006 | |
300 | |a XXIV, 638 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
700 | 1 | |a Liu, Vincent |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-018589483 |
Datensatz im Suchindex
_version_ | 1804140636275736576 |
---|---|
any_adam_object | |
author | Foster, James C. Liu, Vincent |
author_facet | Foster, James C. Liu, Vincent |
author_role | aut aut |
author_sort | Foster, James C. |
author_variant | j c f jc jcf v l vl |
building | Verbundindex |
bvnumber | BV024617262 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)255044007 (DE-599)GBV510570801 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01153nam a2200289 c 4500</leader><controlfield tag="001">BV024617262</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090910 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090924s2006 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499978</subfield><subfield code="9">1-597-49997-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499972</subfield><subfield code="9">978-1-597-49997-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255044007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV510570801</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Writing security tools and exploits</subfield><subfield code="b">[learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code]</subfield><subfield code="c">James C. Foster ; Vincent Liu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 638 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Vincent</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018589483</subfield></datafield></record></collection> |
id | DE-604.BV024617262 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:03:07Z |
institution | BVB |
isbn | 1597499978 9781597499972 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018589483 |
oclc_num | 255044007 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XXIV, 638 S. Ill. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress |
record_format | marc |
spelling | Foster, James C. Verfasser aut Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] James C. Foster ; Vincent Liu Rockland, Mass. Syngress 2006 XXIV, 638 S. Ill. txt rdacontent n rdamedia nc rdacarrier Liu, Vincent Verfasser aut |
spellingShingle | Foster, James C. Liu, Vincent Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] |
title | Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] |
title_auth | Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] |
title_exact_search | Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] |
title_full | Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] James C. Foster ; Vincent Liu |
title_fullStr | Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] James C. Foster ; Vincent Liu |
title_full_unstemmed | Writing security tools and exploits [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] James C. Foster ; Vincent Liu |
title_short | Writing security tools and exploits |
title_sort | writing security tools and exploits learn to write the security tools the other books only teach you to use master advanced payload generation with the metasploit framework see how exploits were developed why the code was vulnerable and what you can do to stop the next vulnerability design create and implement secure code |
title_sub | [learn to write the security tools the other books only teach you to use ; master advanced payload generation with the metasploit framework ; see how exploits were developed, why the code was vulnerable, and what you can do to stop the next vulnerability ; design, create, and implement secure code] |
work_keys_str_mv | AT fosterjamesc writingsecuritytoolsandexploitslearntowritethesecuritytoolstheotherbooksonlyteachyoutousemasteradvancedpayloadgenerationwiththemetasploitframeworkseehowexploitsweredevelopedwhythecodewasvulnerableandwhatyoucandotostopthenextvulnerabilitydesigncreateandimp AT liuvincent writingsecuritytoolsandexploitslearntowritethesecuritytoolstheotherbooksonlyteachyoutousemasteradvancedpayloadgenerationwiththemetasploitframeworkseehowexploitsweredevelopedwhythecodewasvulnerableandwhatyoucandotostopthenextvulnerabilitydesigncreateandimp |