Related Books
Language: en
Pages: 466
Pages: 466
Type: BOOK - Published: 2010-10-28 - Publisher: Elsevier
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exp
Language: en
Pages: 786
Pages: 786
Type: BOOK - Published: 2002 - Publisher: "O'Reilly Media, Inc."
To thoroughly understand what makes Linux tick and why it's so efficient, you need to delve deep into the heart of the operating system--into the Linux kernel i
Language: en
Pages: 583
Pages: 583
Type: BOOK - Published: 2014-03-26 - Publisher: John Wiley & Sons
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the sma
Language: en
Pages: 340
Pages: 340
Type: BOOK - Published: 2021-11-25 - Publisher: Packt Publishing Ltd
Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key FeaturesDiscover a range of t
Language: en
Pages: 521
Pages: 521
Type: BOOK - Published: 2005-01-29 - Publisher: Elsevier
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer