All categories
    cartcart

    Buffer Overflow Attacks: Detect, Exploit, Prevent

     
    Only 1 items left in stock
    Buffer Overflow Attacks: Detect, Exploit, Prevent

    Description

    Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

    Product details

    EAN/ISBN:
    9781932266672
    Medium:
    Paperback
    Number of pages:
    520
    Publication date:
    2005-02-21
    Publisher:
    Syngress
    Manufacturer:
    Unknown
    EAN/ISBN:
    9781932266672
    Medium:
    Paperback
    Number of pages:
    520
    Publication date:
    2005-02-21
    Publisher:
    Syngress
    Manufacturer:
    Unknown

    Shipping

    laposte
    The edition supplied may vary.
    Condition
    Condition
    Learn more
    €8.64
    available immediately
    €8.64
    incl. VAT, plus  Shipping costs
    paypalvisamastercardamexcartebleue
    • Icon badgeChecked second-hand items
    • Icon packageFree shipping from €19
    • Icon vanWith you in 2-4 working days

    More from Foster, James C.