skip to content
Hacking : the art of exploitation Preview this item
ClosePreview this item
Checking...

Hacking : the art of exploitation

Author: Jon Erickson
Publisher: San Francisco, Calif. : No Starch Press, ©2008.
Edition/Format:   eBook : English : 2nd edView all editions and formats
Database:WorldCat
Summary:

Deals with computers/software.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Computer network resources
Additional Physical Format: Print version:
Erickson, Jon, 1977-
Hacking.
San Francisco, Calif. : No Starch Press, c2008
(DLC) 2007042910
Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jon Erickson
ISBN: 9781593273385 159327338X
OCLC Number: 567957090
Description: 1 online resource (x, 472 p.) : ill.
Contents: 1. Introduction --
2. Programming --
3. Exploitation --
4. Networking --
5. Shellcode --
6. Countermeasures --
7. Cryptology --
8. Conclusion.
Responsibility: Jon Erickson.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/567957090>
library:oclcnum"567957090"
library:placeOfPublication
rdf:typeschema:Place
schema:name"San Francisco, Calif."
library:placeOfPublication
owl:sameAs<info:oclcnum/567957090>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"COMPUTERS / Security / General"
schema:about
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"Computer networks / Security measures."
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"COMPUTERS / Networking / Security"
schema:about
rdf:typeschema:Intangible
schema:name"COMPUTERS / Internet / Security"
schema:about
rdf:typeschema:Intangible
schema:name"Computer networks / Security measures."
schema:about
schema:about
schema:author
schema:bookEdition"2nd ed."
schema:bookFormatschema:EBook
schema:copyrightYear"2008"
schema:datePublished"2008"
schema:description"1. Introduction -- 2. Programming -- 3. Exploitation -- 4. Networking -- 5. Shellcode -- 6. Countermeasures -- 7. Cryptology -- 8. Conclusion."
schema:exampleOfWork<http://worldcat.org/entity/work/id/181432963>
schema:inLanguage"en"
schema:name"Hacking the art of exploitation"
schema:numberOfPages"472"
schema:publisher
schema:url<http://site.ebrary.com/id/10218383>
schema:url<http://proquest.safaribooksonline.com/9781593271442>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440046>
schema:url<http://www.books24x7.com/marc.asp?bookid=36704>
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.