Sockets, shellcode, porting & coding :: reverse engineering exploits and tool coding for security professionals /
Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools.
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress Pub.,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools. |
Beschreibung: | 1 online resource (xxviii, 667 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1597490334 9781597490337 9780080489728 0080489729 1597490059 9781597490054 1281020273 9781281020277 9786611020279 6611020276 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm84145907 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 050516s2005 maua obf 001 0 eng d | ||
040 | |a N15 |b eng |e pn |c N15 |d OKU |d OCLCQ |d E7B |d YDXCP |d UBY |d OCLCQ |d NTG |d WPG |d EBLCP |d DKDLA |d ZCU |d FVL |d N$T |d B24X7 |d OCLCQ |d DEBBG |d OCLCQ |d UMI |d DEBSZ |d OCLCO |d OCLCQ |d OCLCF |d OCLCQ |d AU@ |d OCLCQ |d COO |d OCLCQ |d AZK |d LOA |d JBG |d COCUF |d AGLDB |d CNNOR |d LIV |d MERUC |d OCLCQ |d U3W |d OCLCA |d STF |d BRL |d WRM |d VTS |d CEF |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d A6Q |d OCLCQ |d DKC |d OCLCQ |d M8D |d VLY |d UKCRE |d OCLCO |d OCLCQ |d OCL |d OCLCO |d OCLCL | ||
019 | |a 61333933 |a 123117047 |a 181421131 |a 475384095 |a 475489001 |a 507548459 |a 646731068 |a 722349244 |a 728031090 |a 756519667 |a 765142523 |a 780981510 |a 824882234 |a 888504701 |a 961549454 |a 962564457 |a 966254402 |a 988414109 |a 991957542 |a 1035652758 |a 1037516958 |a 1038666689 |a 1045494501 |a 1055404352 |a 1058027675 |a 1076304039 |a 1081226969 |a 1153012628 |a 1162552840 |a 1192339285 |a 1202559261 |a 1202564211 |a 1228606436 | ||
020 | |a 1597490334 |q (electronic bk.) | ||
020 | |a 9781597490337 |q (electronic bk.) | ||
020 | |a 9780080489728 |q (electronic bk.) | ||
020 | |a 0080489729 |q (electronic bk.) | ||
020 | |a 1597490059 | ||
020 | |a 9781597490054 | ||
020 | |a 1281020273 | ||
020 | |a 9781281020277 | ||
020 | |a 9786611020279 | ||
020 | |a 6611020276 | ||
020 | |z 0080489729 | ||
020 | |z 9781597490054 | ||
020 | |z 1597490059 | ||
024 | 1 | 0 | |a 792502900598 |
024 | 3 | |a 9781597490054 | |
035 | |a (OCoLC)84145907 |z (OCoLC)61333933 |z (OCoLC)123117047 |z (OCoLC)181421131 |z (OCoLC)475384095 |z (OCoLC)475489001 |z (OCoLC)507548459 |z (OCoLC)646731068 |z (OCoLC)722349244 |z (OCoLC)728031090 |z (OCoLC)756519667 |z (OCoLC)765142523 |z (OCoLC)780981510 |z (OCoLC)824882234 |z (OCoLC)888504701 |z (OCoLC)961549454 |z (OCoLC)962564457 |z (OCoLC)966254402 |z (OCoLC)988414109 |z (OCoLC)991957542 |z (OCoLC)1035652758 |z (OCoLC)1037516958 |z (OCoLC)1038666689 |z (OCoLC)1045494501 |z (OCoLC)1055404352 |z (OCoLC)1058027675 |z (OCoLC)1076304039 |z (OCoLC)1081226969 |z (OCoLC)1153012628 |z (OCoLC)1162552840 |z (OCoLC)1192339285 |z (OCoLC)1202559261 |z (OCoLC)1202564211 |z (OCoLC)1228606436 | ||
050 | 4 | |a QA76.76.P76 |b F678 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Foster, James C. | |
245 | 1 | 0 | |a Sockets, shellcode, porting & coding : |b reverse engineering exploits and tool coding for security professionals / |c James C. Foster with Mike Price. |
260 | |a Rockland, Mass. : |b Syngress Pub., |c ©2005. | ||
300 | |a 1 online resource (xxviii, 667 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Security coding -- NASL scripting -- BSD sockets -- Windows sockets (Winsock) -- Java sockets -- Writing portable code -- Portable network programming -- Writing shellcode I -- Writing shellcode II -- Writing exploits I -- Writing exploits II -- Writing exploits III -- Writing security components -- Creating a web security tool. | |
546 | |a English. | ||
650 | 0 | |a Reverse engineering. |0 http://id.loc.gov/authorities/subjects/sh93004214 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer security |v Handbooks, manuals, etc. | |
650 | 0 | |a Data protection |v Handbooks, manuals, etc. | |
650 | 0 | |a Programming languages (Electronic computers) |v Handbooks, manuals, etc. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique |v Guides, manuels, etc. | |
650 | 6 | |a Protection de l'information (Informatique) |v Guides, manuels, etc. | |
650 | 6 | |a Langages de programmation |v Guides, manuels, etc. | |
650 | 6 | |a Rétro-ingénierie. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Programming languages (Electronic computers) |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Reverse engineering |2 fast | |
653 | |a Andre fag (naturvidenskab og teknik) |a Andre fag | ||
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
700 | 1 | |a Price, Mike |q (Mike Morgan) |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjCcxcjTjqQGMP7kcTGx9P |0 http://id.loc.gov/authorities/names/no2008056494 | |
776 | 0 | 8 | |i Print version: |a Foster, James C. |t Sockets, shellcode, porting & coding. |d Rockland, MA : Syngress Pub. ; [Sebastopol, CA] : Distributed by O'Reilly Media in the United States and Canada, ©2005 |z 9781597490054 |w (OCoLC)59160703 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249314 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00004508 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL226568 | ||
938 | |a ebrary |b EBRY |n ebr10077271 | ||
938 | |a EBSCOhost |b EBSC |n 249314 | ||
938 | |a YBP Library Services |b YANK |n 2627182 | ||
938 | |a YBP Library Services |b YANK |n 2730637 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm84145907 |
---|---|
_version_ | 1816881645210304512 |
adam_text | |
any_adam_object | |
author | Foster, James C. Price, Mike (Mike Morgan) |
author_GND | http://id.loc.gov/authorities/names/no2008056494 |
author_facet | Foster, James C. Price, Mike (Mike Morgan) |
author_role | aut |
author_sort | Foster, James C. |
author_variant | j c f jc jcf m p mp |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.P76 F678 2005eb |
callnumber-search | QA76.76.P76 F678 2005eb |
callnumber-sort | QA 276.76 P76 F678 42005EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Security coding -- NASL scripting -- BSD sockets -- Windows sockets (Winsock) -- Java sockets -- Writing portable code -- Portable network programming -- Writing shellcode I -- Writing shellcode II -- Writing exploits I -- Writing exploits II -- Writing exploits III -- Writing security components -- Creating a web security tool. |
ctrlnum | (OCoLC)84145907 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05650cam a2200949 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm84145907 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">050516s2005 maua obf 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N15</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N15</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UBY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">WPG</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">FVL</subfield><subfield code="d">N$T</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">61333933</subfield><subfield code="a">123117047</subfield><subfield code="a">181421131</subfield><subfield code="a">475384095</subfield><subfield code="a">475489001</subfield><subfield code="a">507548459</subfield><subfield code="a">646731068</subfield><subfield code="a">722349244</subfield><subfield code="a">728031090</subfield><subfield code="a">756519667</subfield><subfield code="a">765142523</subfield><subfield code="a">780981510</subfield><subfield code="a">824882234</subfield><subfield code="a">888504701</subfield><subfield code="a">961549454</subfield><subfield code="a">962564457</subfield><subfield code="a">966254402</subfield><subfield code="a">988414109</subfield><subfield code="a">991957542</subfield><subfield code="a">1035652758</subfield><subfield code="a">1037516958</subfield><subfield code="a">1038666689</subfield><subfield code="a">1045494501</subfield><subfield code="a">1055404352</subfield><subfield code="a">1058027675</subfield><subfield code="a">1076304039</subfield><subfield code="a">1081226969</subfield><subfield code="a">1153012628</subfield><subfield code="a">1162552840</subfield><subfield code="a">1192339285</subfield><subfield code="a">1202559261</subfield><subfield code="a">1202564211</subfield><subfield code="a">1228606436</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490334</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490337</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489728</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489729</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490059</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490054</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281020273</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281020277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611020279</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611020276</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0080489729</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597490054</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490059</subfield></datafield><datafield tag="024" ind1="1" ind2="0"><subfield code="a">792502900598</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781597490054</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)84145907</subfield><subfield code="z">(OCoLC)61333933</subfield><subfield code="z">(OCoLC)123117047</subfield><subfield code="z">(OCoLC)181421131</subfield><subfield code="z">(OCoLC)475384095</subfield><subfield code="z">(OCoLC)475489001</subfield><subfield code="z">(OCoLC)507548459</subfield><subfield code="z">(OCoLC)646731068</subfield><subfield code="z">(OCoLC)722349244</subfield><subfield code="z">(OCoLC)728031090</subfield><subfield code="z">(OCoLC)756519667</subfield><subfield code="z">(OCoLC)765142523</subfield><subfield code="z">(OCoLC)780981510</subfield><subfield code="z">(OCoLC)824882234</subfield><subfield code="z">(OCoLC)888504701</subfield><subfield code="z">(OCoLC)961549454</subfield><subfield code="z">(OCoLC)962564457</subfield><subfield code="z">(OCoLC)966254402</subfield><subfield code="z">(OCoLC)988414109</subfield><subfield code="z">(OCoLC)991957542</subfield><subfield code="z">(OCoLC)1035652758</subfield><subfield code="z">(OCoLC)1037516958</subfield><subfield code="z">(OCoLC)1038666689</subfield><subfield code="z">(OCoLC)1045494501</subfield><subfield code="z">(OCoLC)1055404352</subfield><subfield code="z">(OCoLC)1058027675</subfield><subfield code="z">(OCoLC)1076304039</subfield><subfield code="z">(OCoLC)1081226969</subfield><subfield code="z">(OCoLC)1153012628</subfield><subfield code="z">(OCoLC)1162552840</subfield><subfield code="z">(OCoLC)1192339285</subfield><subfield code="z">(OCoLC)1202559261</subfield><subfield code="z">(OCoLC)1202564211</subfield><subfield code="z">(OCoLC)1228606436</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.P76</subfield><subfield code="b">F678 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Sockets, shellcode, porting & coding :</subfield><subfield code="b">reverse engineering exploits and tool coding for security professionals /</subfield><subfield code="c">James C. Foster with Mike Price.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 667 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Security coding -- NASL scripting -- BSD sockets -- Windows sockets (Winsock) -- Java sockets -- Writing portable code -- Portable network programming -- Writing shellcode I -- Writing shellcode II -- Writing exploits I -- Writing exploits II -- Writing exploits III -- Writing security components -- Creating a web security tool.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Reverse engineering.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh93004214</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Programming languages (Electronic computers)</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Langages de programmation</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Rétro-ingénierie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Programming languages (Electronic computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Reverse engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Andre fag (naturvidenskab og teknik)</subfield><subfield code="a">Andre fag</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Price, Mike</subfield><subfield code="q">(Mike Morgan)</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjCcxcjTjqQGMP7kcTGx9P</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008056494</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Foster, James C.</subfield><subfield code="t">Sockets, shellcode, porting & coding.</subfield><subfield code="d">Rockland, MA : Syngress Pub. ; [Sebastopol, CA] : Distributed by O'Reilly Media in the United States and Canada, ©2005</subfield><subfield code="z">9781597490054</subfield><subfield code="w">(OCoLC)59160703</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249314</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004508</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL226568</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10077271</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">249314</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627182</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730637</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocm84145907 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:00Z |
institution | BVB |
isbn | 1597490334 9781597490337 9780080489728 0080489729 1597490059 9781597490054 1281020273 9781281020277 9786611020279 6611020276 |
language | English |
oclc_num | 84145907 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxviii, 667 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Foster, James C. Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price. Rockland, Mass. : Syngress Pub., ©2005. 1 online resource (xxviii, 667 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Includes bibliographical references and index. Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools. Print version record. Security coding -- NASL scripting -- BSD sockets -- Windows sockets (Winsock) -- Java sockets -- Writing portable code -- Portable network programming -- Writing shellcode I -- Writing shellcode II -- Writing exploits I -- Writing exploits II -- Writing exploits III -- Writing security components -- Creating a web security tool. English. Reverse engineering. http://id.loc.gov/authorities/subjects/sh93004214 Computer security. Computer security Handbooks, manuals, etc. Data protection Handbooks, manuals, etc. Programming languages (Electronic computers) Handbooks, manuals, etc. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique Guides, manuels, etc. Protection de l'information (Informatique) Guides, manuels, etc. Langages de programmation Guides, manuels, etc. Rétro-ingénierie. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Programming languages (Electronic computers) fast Data protection fast Computer security fast Reverse engineering fast Andre fag (naturvidenskab og teknik) Andre fag handbooks. aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf Price, Mike (Mike Morgan) aut https://id.oclc.org/worldcat/entity/E39PCjCcxcjTjqQGMP7kcTGx9P http://id.loc.gov/authorities/names/no2008056494 Print version: Foster, James C. Sockets, shellcode, porting & coding. Rockland, MA : Syngress Pub. ; [Sebastopol, CA] : Distributed by O'Reilly Media in the United States and Canada, ©2005 9781597490054 (OCoLC)59160703 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249314 Volltext |
spellingShingle | Foster, James C. Price, Mike (Mike Morgan) Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / Security coding -- NASL scripting -- BSD sockets -- Windows sockets (Winsock) -- Java sockets -- Writing portable code -- Portable network programming -- Writing shellcode I -- Writing shellcode II -- Writing exploits I -- Writing exploits II -- Writing exploits III -- Writing security components -- Creating a web security tool. Reverse engineering. http://id.loc.gov/authorities/subjects/sh93004214 Computer security. Computer security Handbooks, manuals, etc. Data protection Handbooks, manuals, etc. Programming languages (Electronic computers) Handbooks, manuals, etc. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique Guides, manuels, etc. Protection de l'information (Informatique) Guides, manuels, etc. Langages de programmation Guides, manuels, etc. Rétro-ingénierie. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Programming languages (Electronic computers) fast Data protection fast Computer security fast Reverse engineering fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh93004214 https://id.nlm.nih.gov/mesh/D016494 http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / |
title_auth | Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / |
title_exact_search | Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / |
title_full | Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price. |
title_fullStr | Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price. |
title_full_unstemmed | Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price. |
title_short | Sockets, shellcode, porting & coding : |
title_sort | sockets shellcode porting coding reverse engineering exploits and tool coding for security professionals |
title_sub | reverse engineering exploits and tool coding for security professionals / |
topic | Reverse engineering. http://id.loc.gov/authorities/subjects/sh93004214 Computer security. Computer security Handbooks, manuals, etc. Data protection Handbooks, manuals, etc. Programming languages (Electronic computers) Handbooks, manuals, etc. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique Guides, manuels, etc. Protection de l'information (Informatique) Guides, manuels, etc. Langages de programmation Guides, manuels, etc. Rétro-ingénierie. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Programming languages (Electronic computers) fast Data protection fast Computer security fast Reverse engineering fast |
topic_facet | Reverse engineering. Computer security. Computer security Handbooks, manuals, etc. Data protection Handbooks, manuals, etc. Programming languages (Electronic computers) Handbooks, manuals, etc. Computer Security Sécurité informatique Guides, manuels, etc. Protection de l'information (Informatique) Guides, manuels, etc. Langages de programmation Guides, manuels, etc. Rétro-ingénierie. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Programming languages (Electronic computers) Data protection Computer security Reverse engineering handbooks. Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249314 |
work_keys_str_mv | AT fosterjamesc socketsshellcodeportingcodingreverseengineeringexploitsandtoolcodingforsecurityprofessionals AT pricemike socketsshellcodeportingcodingreverseengineeringexploitsandtoolcodingforsecurityprofessionals |