Exploit!: Code härten, Bugs analysieren, Hacks verstehen
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | German |
Veröffentlicht: |
Bonn
Rheinwerk Verlag
2019
|
Ausgabe: | 1. Auflage |
Schriftenreihe: | Rheinwerk Computing
|
Schlagworte: | |
Online-Zugang: | DE-B768 DE-863 DE-862 DE-91 |
Beschreibung: | Auf dem Cover: Vom Buffer Overflow zur Code Execution: So funktionieren Exploits wirklich ; Mitigations, Reverse Engineering, Kryptografie, gutes Design, sauberer Code ; Spectre & Meltdown, Heartbleed, Shellshock, Stagefright ; Codebeispiele zum Download |
Beschreibung: | 1 Online-Ressource (521 Seiten) Illustrationen, Diagramme |
ISBN: | 9783836266000 |
Internformat
MARC
LEADER | 00000nmm a22000008c 4500 | ||
---|---|---|---|
001 | BV047038638 | ||
003 | DE-604 | ||
005 | 20241024 | ||
007 | cr|uuu---uuuuu | ||
008 | 201201s2019 gw |||| o||u| ||||||ger d | ||
020 | |a 9783836266000 |9 978-3-8362-6600-0 | ||
035 | |a (OCoLC)1225884602 | ||
035 | |a (DE-599)BVBBV047038638 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a gw |c XA-DE-NW | ||
049 | |a DE-863 |a DE-862 |a DE-91G |a DE-B768 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 461 |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 055 |2 stub | ||
100 | 1 | |a Gebeshuber, Klaus |e Verfasser |0 (DE-588)1161609970 |4 aut | |
245 | 1 | 0 | |a Exploit! |b Code härten, Bugs analysieren, Hacks verstehen |c Klaus Gebeshuber, Egon Teiniker, Wilhelm Zugaj |
250 | |a 1. Auflage | ||
264 | 1 | |a Bonn |b Rheinwerk Verlag |c 2019 | |
300 | |a 1 Online-Ressource (521 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rheinwerk Computing | |
500 | |a Auf dem Cover: Vom Buffer Overflow zur Code Execution: So funktionieren Exploits wirklich ; Mitigations, Reverse Engineering, Kryptografie, gutes Design, sauberer Code ; Spectre & Meltdown, Heartbleed, Shellshock, Stagefright ; Codebeispiele zum Download | ||
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bug |g Informatik |0 (DE-588)4238603-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Exploit |0 (DE-588)4752509-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
653 | |a Fuzzing | ||
653 | |a Encapsulation | ||
653 | |a Data Validation | ||
653 | |a Architectural Risk Analysis | ||
653 | |a ASLR SEHOP | ||
653 | |a OWASP | ||
653 | |a IT-Security | ||
653 | |a Hacking | ||
653 | |a Underrun | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Exploit |0 (DE-588)4752509-5 |D s |
689 | 1 | 1 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 1 | 2 | |a Bug |g Informatik |0 (DE-588)4238603-2 |D s |
689 | 1 | 3 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 1 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 6 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Teiniker, Egon |e Verfasser |0 (DE-588)1192329236 |4 aut | |
700 | 1 | |a Zugaj, Wilhelm |d 1972- |e Verfasser |0 (DE-588)1192311973 |4 aut | |
710 | 2 | |a Galileo Press |0 (DE-588)1065964404 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 3-8362-6598-2 |z 978-3-8362-6598-0 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032445763 | |
966 | e | |u https://ebookcentral.proquest.com/lib/bht-berlin/detail.action?docID=6382565 |l DE-B768 |p ZDB-30-PQE |q BHT-Einzelkauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382565 |l DE-863 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382565 |l DE-862 |p ZDB-30-PQE |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6382565 |l DE-91 |p ZDB-30-PQE |q TUM_Einzelkauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 861580 |
---|---|
_version_ | 1813849467225374720 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Gebeshuber, Klaus Teiniker, Egon Zugaj, Wilhelm 1972- |
author_GND | (DE-588)1161609970 (DE-588)1192329236 (DE-588)1192311973 |
author_facet | Gebeshuber, Klaus Teiniker, Egon Zugaj, Wilhelm 1972- |
author_role | aut aut aut |
author_sort | Gebeshuber, Klaus |
author_variant | k g kg e t et w z wz |
building | Verbundindex |
bvnumber | BV047038638 |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 461 DAT 055 |
collection | ZDB-30-PQE |
ctrlnum | (OCoLC)1225884602 (DE-599)BVBBV047038638 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. Auflage |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a22000008c 4500</leader><controlfield tag="001">BV047038638</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241024</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201201s2019 gw |||| o||u| ||||||ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783836266000</subfield><subfield code="9">978-3-8362-6600-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1225884602</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047038638</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-B768</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploit!</subfield><subfield code="b">Code härten, Bugs analysieren, Hacks verstehen</subfield><subfield code="c">Klaus Gebeshuber, Egon Teiniker, Wilhelm Zugaj</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bonn</subfield><subfield code="b">Rheinwerk Verlag</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (521 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk Computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: Vom Buffer Overflow zur Code Execution: So funktionieren Exploits wirklich ; Mitigations, Reverse Engineering, Kryptografie, gutes Design, sauberer Code ; Spectre & Meltdown, Heartbleed, Shellshock, Stagefright ; Codebeispiele zum Download</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bug</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4238603-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Exploit</subfield><subfield code="0">(DE-588)4752509-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fuzzing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Encapsulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Validation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Architectural Risk Analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ASLR SEHOP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">OWASP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Underrun</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Exploit</subfield><subfield code="0">(DE-588)4752509-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Bug</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4238603-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Teiniker, Egon</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1192329236</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zugaj, Wilhelm</subfield><subfield code="d">1972-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1192311973</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Galileo Press</subfield><subfield code="0">(DE-588)1065964404</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">3-8362-6598-2</subfield><subfield code="z">978-3-8362-6598-0</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032445763</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/bht-berlin/detail.action?docID=6382565</subfield><subfield code="l">DE-B768</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">BHT-Einzelkauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382565</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/fhws/detail.action?docID=6382565</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6382565</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047038638 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:04:38Z |
indexdate | 2024-10-25T04:00:50Z |
institution | BVB |
institution_GND | (DE-588)1065964404 |
isbn | 9783836266000 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032445763 |
oclc_num | 1225884602 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-91G DE-BY-TUM DE-B768 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-91G DE-BY-TUM DE-B768 |
physical | 1 Online-Ressource (521 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-30-PQE BHT-Einzelkauf ZDB-30-PQE TUM_Einzelkauf |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Rheinwerk Verlag |
record_format | marc |
series2 | Rheinwerk Computing |
spellingShingle | Gebeshuber, Klaus Teiniker, Egon Zugaj, Wilhelm 1972- Exploit! Code härten, Bugs analysieren, Hacks verstehen Softwareentwicklung (DE-588)4116522-6 gnd Datensicherung (DE-588)4011144-1 gnd Bug Informatik (DE-588)4238603-2 gnd Exploit (DE-588)4752509-5 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Reverse Engineering (DE-588)4391935-2 gnd |
subject_GND | (DE-588)4116522-6 (DE-588)4011144-1 (DE-588)4238603-2 (DE-588)4752509-5 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4391935-2 |
title | Exploit! Code härten, Bugs analysieren, Hacks verstehen |
title_auth | Exploit! Code härten, Bugs analysieren, Hacks verstehen |
title_exact_search | Exploit! Code härten, Bugs analysieren, Hacks verstehen |
title_exact_search_txtP | Exploit! Code härten, Bugs analysieren, Hacks verstehen |
title_full | Exploit! Code härten, Bugs analysieren, Hacks verstehen Klaus Gebeshuber, Egon Teiniker, Wilhelm Zugaj |
title_fullStr | Exploit! Code härten, Bugs analysieren, Hacks verstehen Klaus Gebeshuber, Egon Teiniker, Wilhelm Zugaj |
title_full_unstemmed | Exploit! Code härten, Bugs analysieren, Hacks verstehen Klaus Gebeshuber, Egon Teiniker, Wilhelm Zugaj |
title_short | Exploit! |
title_sort | exploit code harten bugs analysieren hacks verstehen |
title_sub | Code härten, Bugs analysieren, Hacks verstehen |
topic | Softwareentwicklung (DE-588)4116522-6 gnd Datensicherung (DE-588)4011144-1 gnd Bug Informatik (DE-588)4238603-2 gnd Exploit (DE-588)4752509-5 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Reverse Engineering (DE-588)4391935-2 gnd |
topic_facet | Softwareentwicklung Datensicherung Bug Informatik Exploit Computersicherheit Kryptologie Reverse Engineering |
work_keys_str_mv | AT gebeshuberklaus exploitcodehartenbugsanalysierenhacksverstehen AT teinikeregon exploitcodehartenbugsanalysierenhacksverstehen AT zugajwilhelm exploitcodehartenbugsanalysierenhacksverstehen AT galileopress exploitcodehartenbugsanalysierenhacksverstehen |