skip to content
Hacking : the art of exploitation Preview this item
ClosePreview this item
Checking...

Hacking : the art of exploitation

Author: Jon Erickson
Publisher: San Francisco, Calif. : No Starch Press, ©2008.
Edition/Format:   eBook : English : 2nd edView all editions and formats
Database:WorldCat
Summary:

Deals with computers/software.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Computer network resources
Additional Physical Format: Print version:
Erickson, Jon, 1977-
Hacking.
San Francisco, Calif. : No Starch Press, c2008
(DLC) 2007042910
Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jon Erickson
ISBN: 9781593273385 159327338X
OCLC Number: 567957090
Description: 1 online resource (x, 472 p.) : ill.
Contents: 1. Introduction --
2. Programming --
3. Exploitation --
4. Networking --
5. Shellcode --
6. Countermeasures --
7. Cryptology --
8. Conclusion.
Responsibility: Jon Erickson.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/567957090>
library:oclcnum"567957090"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/567957090>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookEdition"2nd ed."
schema:bookFormatschema:EBook
schema:copyrightYear"2008"
schema:creator
schema:datePublished"2008"
schema:description"1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/181432963>
schema:genre"Computer network resources."@en
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Hacking the art of exploitation"@en
schema:numberOfPages"472"
schema:publisher
schema:url<http://www.books24x7.com/marc.asp?bookid=36704>
schema:url<http://site.ebrary.com/id/10218383>
schema:url
schema:url<http://proquest.safaribooksonline.com/9781593271442>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440046>
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.