Writing security tools and exploits /:
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to c...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2006.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1423754980 9781423754985 0080493130 9780080493138 9781597499972 1597499978 1281035777 9781281035776 9786611035778 661103577X 1597490946 9781597490948 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm64218908 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060223s2006 mau obf 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d B24X7 |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d N15 |d E7B |d IDEBK |d NTG |d DKDLA |d MHW |d OPELS |d OKU |d FVL |d DEBSZ |d AU@ |d OCL |d OCLCQ |d AZK |d LOA |d JBG |d AGLDB |d COCUF |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d WY@ |d U3W |d OCLCA |d LUE |d STF |d BRL |d WRM |d D6H |d WCO |d VTS |d NRAMU |d EZ9 |d OCLCQ |d INT |d VT2 |d OCLCQ |d COO |d A6Q |d OCLCQ |d LEAUB |d M8D |d UKCRE |d INARC |d S2H |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d QGK |d COA |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 70925770 |a 84145948 |a 162597702 |a 181421137 |a 473722852 |a 475321967 |a 647464662 |a 722429473 |a 728037592 |a 780982323 |a 856960413 |a 961584038 |a 962656568 |a 968296124 |a 988413330 |a 991915958 |a 1035708642 |a 1037504239 |a 1038607951 |a 1045562501 |a 1047575764 |a 1055404316 |a 1076307803 |a 1081225605 |a 1153003495 |a 1228603876 |a 1259071754 |a 1340066705 | ||
020 | |a 1423754980 |q (electronic bk.) | ||
020 | |a 9781423754985 |q (electronic bk.) | ||
020 | |a 0080493130 | ||
020 | |a 9780080493138 | ||
020 | |a 9781597499972 | ||
020 | |a 1597499978 | ||
020 | |a 1281035777 | ||
020 | |a 9781281035776 | ||
020 | |a 9786611035778 | ||
020 | |a 661103577X | ||
020 | |a 1597490946 | ||
020 | |a 9781597490948 | ||
024 | 8 | |a (WaSeSS)ssj0000275355 | |
035 | |a (OCoLC)64218908 |z (OCoLC)70925770 |z (OCoLC)84145948 |z (OCoLC)162597702 |z (OCoLC)181421137 |z (OCoLC)473722852 |z (OCoLC)475321967 |z (OCoLC)647464662 |z (OCoLC)722429473 |z (OCoLC)728037592 |z (OCoLC)780982323 |z (OCoLC)856960413 |z (OCoLC)961584038 |z (OCoLC)962656568 |z (OCoLC)968296124 |z (OCoLC)988413330 |z (OCoLC)991915958 |z (OCoLC)1035708642 |z (OCoLC)1037504239 |z (OCoLC)1038607951 |z (OCoLC)1045562501 |z (OCoLC)1047575764 |z (OCoLC)1055404316 |z (OCoLC)1076307803 |z (OCoLC)1081225605 |z (OCoLC)1153003495 |z (OCoLC)1228603876 |z (OCoLC)1259071754 |z (OCoLC)1340066705 | ||
037 | |a 131902:132009 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b F67 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Foster, James C. | |
245 | 1 | 0 | |a Writing security tools and exploits / |c James C. Foster, Vincent Liu. |
260 | |a Rockland, MA : |b Syngress, |c ©2006. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
380 | |a Handbook | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index. | |
520 | |a Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts. | ||
546 | |a English. | ||
650 | 0 | |a Computer security |v Handbooks, manuals, etc. | |
650 | 6 | |a Sécurité informatique |v Guides, manuels, etc. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
655 | 0 | |a Electronic books. | |
655 | 2 | |a Handbook |0 https://id.nlm.nih.gov/mesh/D020479 | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
700 | 1 | |a Liu, Vincent. |0 http://id.loc.gov/authorities/names/no2006034176 | |
758 | |i has work: |a Writing security tools and exploits (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG9pPKRCc6gMhkpqrRX9cK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Foster, James C. |t Writing security tools and exploits. |d Rockland, MA : Syngress, ©2006 |z 1597499978 |z 9781597499972 |w (OCoLC)64386244 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149589 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597499972 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00005244 | ||
938 | |a ebrary |b EBRY |n ebr10110279 | ||
938 | |a EBSCOhost |b EBSC |n 149589 | ||
938 | |a Internet Archive |b INAR |n writingsecurityt0000fost | ||
938 | |a YBP Library Services |b YANK |n 2395179 | ||
938 | |a YBP Library Services |b YANK |n 2627188 | ||
938 | |a YBP Library Services |b YANK |n 2730642 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm64218908 |
---|---|
_version_ | 1816881633995784192 |
adam_text | |
any_adam_object | |
author | Foster, James C. |
author2 | Liu, Vincent |
author2_role | |
author2_variant | v l vl |
author_GND | http://id.loc.gov/authorities/names/no2006034176 |
author_facet | Foster, James C. Liu, Vincent |
author_role | |
author_sort | Foster, James C. |
author_variant | j c f jc jcf |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 F67 2006eb |
callnumber-search | QA76.9.A25 F67 2006eb |
callnumber-sort | QA 276.9 A25 F67 42006EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index. |
ctrlnum | (OCoLC)64218908 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05234cam a2200829 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm64218908 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">060223s2006 mau obf 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N15</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">NTG</subfield><subfield code="d">DKDLA</subfield><subfield code="d">MHW</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">FVL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">WCO</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">UKCRE</subfield><subfield code="d">INARC</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">70925770</subfield><subfield code="a">84145948</subfield><subfield code="a">162597702</subfield><subfield code="a">181421137</subfield><subfield code="a">473722852</subfield><subfield code="a">475321967</subfield><subfield code="a">647464662</subfield><subfield code="a">722429473</subfield><subfield code="a">728037592</subfield><subfield code="a">780982323</subfield><subfield code="a">856960413</subfield><subfield code="a">961584038</subfield><subfield code="a">962656568</subfield><subfield code="a">968296124</subfield><subfield code="a">988413330</subfield><subfield code="a">991915958</subfield><subfield code="a">1035708642</subfield><subfield code="a">1037504239</subfield><subfield code="a">1038607951</subfield><subfield code="a">1045562501</subfield><subfield code="a">1047575764</subfield><subfield code="a">1055404316</subfield><subfield code="a">1076307803</subfield><subfield code="a">1081225605</subfield><subfield code="a">1153003495</subfield><subfield code="a">1228603876</subfield><subfield code="a">1259071754</subfield><subfield code="a">1340066705</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754980</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754985</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080493130</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080493138</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499972</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499978</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035777</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035776</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035778</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">661103577X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490946</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490948</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000275355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64218908</subfield><subfield code="z">(OCoLC)70925770</subfield><subfield code="z">(OCoLC)84145948</subfield><subfield code="z">(OCoLC)162597702</subfield><subfield code="z">(OCoLC)181421137</subfield><subfield code="z">(OCoLC)473722852</subfield><subfield code="z">(OCoLC)475321967</subfield><subfield code="z">(OCoLC)647464662</subfield><subfield code="z">(OCoLC)722429473</subfield><subfield code="z">(OCoLC)728037592</subfield><subfield code="z">(OCoLC)780982323</subfield><subfield code="z">(OCoLC)856960413</subfield><subfield code="z">(OCoLC)961584038</subfield><subfield code="z">(OCoLC)962656568</subfield><subfield code="z">(OCoLC)968296124</subfield><subfield code="z">(OCoLC)988413330</subfield><subfield code="z">(OCoLC)991915958</subfield><subfield code="z">(OCoLC)1035708642</subfield><subfield code="z">(OCoLC)1037504239</subfield><subfield code="z">(OCoLC)1038607951</subfield><subfield code="z">(OCoLC)1045562501</subfield><subfield code="z">(OCoLC)1047575764</subfield><subfield code="z">(OCoLC)1055404316</subfield><subfield code="z">(OCoLC)1076307803</subfield><subfield code="z">(OCoLC)1081225605</subfield><subfield code="z">(OCoLC)1153003495</subfield><subfield code="z">(OCoLC)1228603876</subfield><subfield code="z">(OCoLC)1259071754</subfield><subfield code="z">(OCoLC)1340066705</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">131902:132009</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">F67 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Writing security tools and exploits /</subfield><subfield code="c">James C. Foster, Vincent Liu.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="380" ind1=" " ind2=" "><subfield code="a">Handbook</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Handbook</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D020479</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Vincent.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2006034176</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Writing security tools and exploits (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG9pPKRCc6gMhkpqrRX9cK</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Foster, James C.</subfield><subfield code="t">Writing security tools and exploits.</subfield><subfield code="d">Rockland, MA : Syngress, ©2006</subfield><subfield code="z">1597499978</subfield><subfield code="z">9781597499972</subfield><subfield code="w">(OCoLC)64386244</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149589</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597499972</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00005244</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10110279</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">149589</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">writingsecurityt0000fost</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2395179</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627188</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730642</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. Handbook https://id.nlm.nih.gov/mesh/D020479 handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | Electronic books. Handbook handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocm64218908 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:50Z |
institution | BVB |
isbn | 1423754980 9781423754985 0080493130 9780080493138 9781597499972 1597499978 1281035777 9781281035776 9786611035778 661103577X 1597490946 9781597490948 |
language | English |
oclc_num | 64218908 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress, |
record_format | marc |
spelling | Foster, James C. Writing security tools and exploits / James C. Foster, Vincent Liu. Rockland, MA : Syngress, ©2006. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Handbook Includes bibliographical references and index. Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index. Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts. English. Computer security Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Electronic books. Handbook https://id.nlm.nih.gov/mesh/D020479 handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf Liu, Vincent. http://id.loc.gov/authorities/names/no2006034176 has work: Writing security tools and exploits (Text) https://id.oclc.org/worldcat/entity/E39PCG9pPKRCc6gMhkpqrRX9cK https://id.oclc.org/worldcat/ontology/hasWork Print version: Foster, James C. Writing security tools and exploits. Rockland, MA : Syngress, ©2006 1597499978 9781597499972 (OCoLC)64386244 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149589 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597499972 Volltext |
spellingShingle | Foster, James C. Writing security tools and exploits / Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index. Computer security Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast |
subject_GND | https://id.nlm.nih.gov/mesh/D020479 http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | Writing security tools and exploits / |
title_auth | Writing security tools and exploits / |
title_exact_search | Writing security tools and exploits / |
title_full | Writing security tools and exploits / James C. Foster, Vincent Liu. |
title_fullStr | Writing security tools and exploits / James C. Foster, Vincent Liu. |
title_full_unstemmed | Writing security tools and exploits / James C. Foster, Vincent Liu. |
title_short | Writing security tools and exploits / |
title_sort | writing security tools and exploits |
topic | Computer security Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast |
topic_facet | Computer security Handbooks, manuals, etc. Sécurité informatique Guides, manuels, etc. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Electronic books. Handbook handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149589 https://www.sciencedirect.com/science/book/9781597499972 |
work_keys_str_mv | AT fosterjamesc writingsecuritytoolsandexploits AT liuvincent writingsecuritytoolsandexploits |