The Shellcoder'S Handbook: Discovering And Exploiting Security Holes

The Shellcoder'S Handbook: Discovering And Exploiting Security Holes

In Stock
SKU: SONG0764544683
UPC: 785555877092
Brand: John Wiley & Sons Inc
Regular price$9.81
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Examines Where Security Holes Come From, How To Discover Them, How Hackers Exploit Them And Take Control Of Systems On A Daily Basis, And Most Importantly, How To Close These Security Holes So They Never Occur Again A Unique Author Teama Blend Of Industry And Underground Experts Explain The Techniques That Readers Can Use To Uncover Security Holes In Any Software Or Operating System Shows How To Pinpoint Vulnerabilities In Popular Operating Systems (Including Windows, Linux, And Solaris) And Applications (Including Ms Sql Server And Oracle Databases) Details How To Deal With Discovered Vulnerabilities, Sharing Some Previously Unpublished Advanced Exploits And Techniques

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: What is the main focus of 'The Shellcoder's Handbook'? A: 'The Shellcoder's Handbook' primarily examines the origins of security holes, how to discover them, and how hackers exploit these vulnerabilities. It also provides techniques to close these security gaps effectively.
  • Q: Who are the authors of this book? A: The book is authored by Jack Koziol, who is part of a unique team that includes both industry professionals and underground experts.
  • Q: What operating systems are covered in this book? A: The book details how to pinpoint vulnerabilities in popular operating systems such as Windows, Linux, and Solaris.
  • Q: Is this book suitable for beginners in cybersecurity? A: While the book provides valuable insights, it is best suited for readers who have some prior knowledge of cybersecurity concepts, as it delves into advanced exploits and techniques.
  • Q: What edition of 'The Shellcoder's Handbook' is available? A: This is the first edition of 'The Shellcoder's Handbook', published on April 2, 2004.
  • Q: How many pages does the book have? A: The book contains a total of 644 pages, offering comprehensive coverage of the subject matter.
  • Q: What condition is the book in? A: 'The Shellcoder's Handbook' is available as a used book in good condition, ensuring that it is a reliable resource for readers.
  • Q: What type of binding does this book have? A: The book is available in paperback binding, making it portable and easy to handle.
  • Q: What topics are covered in terms of vulnerability management? A: The book provides insights into how to deal with discovered vulnerabilities, sharing advanced exploits and techniques for remediation.
  • Q: Does the book include unpublished techniques? A: Yes, 'The Shellcoder's Handbook' shares some previously unpublished advanced exploits and techniques, making it a unique resource for security professionals.

Recently Viewed