Exploiting software : how to break code /
Guardado en:
| Autor principal: | |
|---|---|
| Otros Autores: | |
| Formato: | Libro |
| Lenguaje: | Español Inglés |
| Publicado: |
Boston :
Addison-Wesley,
c2004
|
| Materias: | |
| Aporte de: | Registro referencial: Solicitar el recurso aquí |
| LEADER | 01055nam a2200313a 44500 | ||
|---|---|---|---|
| 001 | UBP11611 | ||
| 003 | AR-CdUBP | ||
| 005 | 20220310155948.0 | ||
| 008 | 070810s2004 maua f 001 spa d | ||
| 020 | |a 0-201-78695-8 | ||
| 040 | |a AR-CdUBP |b spa | ||
| 041 | |a eng | ||
| 100 | |a Hoglund, Greg | ||
| 245 | 1 | 0 | |a Exploiting software : |b how to break code / |c Greg Hoglund, Gary McGraw. |
| 260 | |a Boston : |b Addison-Wesley, |c c2004 | ||
| 300 | |a xxxv, 471 p. : |b il. ; |c 24 cm. | ||
| 504 | |a Indice: p. 453-471. | ||
| 504 | |a Bibliografía: p. 449-451. | ||
| 505 | 0 | |a 1. Software. The root of teh problem. 2. Attack patterns. 3. Reverse engineering and program understanding. Exploiting server software. 5. Exploiting client software. 6. Crafting (malicious) input. 7. Buffer overflow. 8. Rootkits. | |
| 650 | 4 | |a SEGURIDAD INFORMATICA | |
| 650 | 4 | |a HACKERS | |
| 653 | |a INFORMATICA | ||
| 700 | 1 | |a McGraw, Gary | |
| 930 | |a INFORMATICA | ||
| 931 | |a 11611 |b UBP | ||
| 942 | |2 cdu |c BK | ||
| 945 | |a JPG | ||
| 984 | |a 004.056.53 |b H679 | ||
| 999 | |c 26739 |d 26739 | ||