Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
by Koziol, Jack; Litchfield,... | PB | Acceptable
US $6.55
ApproximatelyS$ 8.42
Condition:
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ”... Read moreabout condition
Acceptable
A book with obvious wear. May have some damage to the cover but integrity still intact. The binding may be slightly damaged but integrity is still intact. Possible writing in margins, possible underlining and highlighting of text, but no missing pages or anything that would compromise the legibility or understanding of the text.
3 available1 sold
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Economy Shipping.
Located in: Aurora, Illinois, United States
Delivery:
Estimated between Thu, 11 Sep and Tue, 16 Sep to 94104
Returns:
30 days return. Seller pays for return shipping.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:146241410318
Item specifics
- Condition
- Acceptable
- Seller Notes
- Binding
- Paperback
- Book Title
- The Shellcoder's Handbook
- Weight
- 2 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9780764544682
About this product
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0764544683
ISBN-13
9780764544682
eBay Product ID (ePID)
5960347
Product Key Features
Number of Pages
644 Pages
Publication Name
Shellcoder's Handbook : Discovering and Exploiting Security Holes
Language
English
Publication Year
2004
Subject
Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.4 in
Item Weight
34.3 Oz
Item Length
9.3 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
LCCN
2003-027629
Reviews
"...80%...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed..." ( PC Utilities , July 2004) "...essential for administrators who want to secure computer systems under their management..." ( Computer Weekly , March 2004) "...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
TitleLeading
The
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
About the Authors.Credits.Acknowledgments.Part 1: Introduction to Exploitation: Linux on x86.Chapter 1: Before You Begin.Chapter 2: Stack Overflows.Chapter 3: Shellcode.Chapter 4: Introduction to Format String Bugs.Chapter 5: Introduction to Heap Overflows.Part 2: Exploiting More Platforms: Windows, Solaris, and Tru64.Chapter 6: The Wild World of Windows.Chapter 7: Windows Shellcode.Chapter 8: Windows Overflows.Chapter 9: Overcoming Filters.Chapter 10: Introduction to Solaris Exploitation.Chapter 11: Advanced Solaris Exploitation.Chapter 12: HP Tru64 Unix Exploitation.Part 3: Vulnerability Discovery.Chapter 13: Establishing a Working Environment.Chapter 14: Fault Injection.Chapter 15: The Art of Fuzzing.Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages.Chapter 17: Instrumented Investigation: A Manual Approach.Chapter 18: Tracing for Vulnerabilities.Chapter 19: Binary Auditing: Hacking Closed Source Software.Part 4: Advanced Materials.Chapter 20: Alternative Payload Strategies.Chapter 21: Writing Exploits that Work in the Wild.Chapter 22: Attacking Database Software.Chapter 23: Kernel Overflows.Chapter 24: Exploiting Kernel Vulnerabilities.Index.
Synopsis
Uncover, exploit, and close security holes in any software or operating systemEvery day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, youa'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed."The Shellcodera's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows r , Linux r , and Solaris TM ) and applications (including MS SQL Server and Oracle r databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniques, Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
LC Classification Number
QA76.9.A25
Item description from the seller
Seller feedback (5,736,133)
This item (1)
All items (5,736,133)
- eBay automated Feedback- Feedback left by buyer.Past monthOrder completed successfully – tracked and on time
- eBay automated Feedback- Feedback left by buyer.Past monthOrder completed successfully – tracked and on time
- 6***e (911)- Feedback left by buyer.Past monthVerified purchaseThe book is new. It did take two weeks for delivery. I have previously ordered books from this company and received the delivery in a week.