Hacking. The art of Explotation (second edition)
Kazhdyy programmist po suti svoey — haker. Ved' pervonachal'no hakingom nazyvali poisk iskusnogo i neochevidnogo resheniya. Ponimanie principov programmirovaniya pomogaet nahodit' uyazvimosti, a navyki obnaruzheniya uyazvimostey pomogayut sozdavat' programmy, poetomu mnogie hakery zanimayutsya tem i drugim odnovremenno. Interesnye nestandartnye hody est' kak v tekhnikah napisaniya elegantnyh programm, tak i v tekhnikah poiska slabyh mest. S chego nachat'? CHtoby perezapisyvat' pamyat' s pomoshch'yu perepolneniya bufera, poluchat' dostup k udalennomu serveru i perekhvatyvat' soedineniya vam predstoit programmirovat' na Si i assemblere, ispol'zovat' shell-kod i registry processora, poznakomit'sya s setevymi vzaimodeystviyami i shifrovaniem i mnogoe drugoe. Kak by my ni hoteli verit' v chudo, programmnoe obespechenie i komp'yuternye seti, ot kotoryh zavisit nasha povsednevnaya zhizn', obladayut uyazvimostyami. Mir bez hakerov — eto mir bez lyubopytstva i novatorskih resheniy. Dzhon Erikson
"1141315064"
Hacking. The art of Explotation (second edition)
Kazhdyy programmist po suti svoey — haker. Ved' pervonachal'no hakingom nazyvali poisk iskusnogo i neochevidnogo resheniya. Ponimanie principov programmirovaniya pomogaet nahodit' uyazvimosti, a navyki obnaruzheniya uyazvimostey pomogayut sozdavat' programmy, poetomu mnogie hakery zanimayutsya tem i drugim odnovremenno. Interesnye nestandartnye hody est' kak v tekhnikah napisaniya elegantnyh programm, tak i v tekhnikah poiska slabyh mest. S chego nachat'? CHtoby perezapisyvat' pamyat' s pomoshch'yu perepolneniya bufera, poluchat' dostup k udalennomu serveru i perekhvatyvat' soedineniya vam predstoit programmirovat' na Si i assemblere, ispol'zovat' shell-kod i registry processora, poznakomit'sya s setevymi vzaimodeystviyami i shifrovaniem i mnogoe drugoe. Kak by my ni hoteli verit' v chudo, programmnoe obespechenie i komp'yuternye seti, ot kotoryh zavisit nasha povsednevnaya zhizn', obladayut uyazvimostyami. Mir bez hakerov — eto mir bez lyubopytstva i novatorskih resheniy. Dzhon Erikson
10.49 In Stock
Hacking. The art of Explotation (second edition)

Hacking. The art of Explotation (second edition)

Hacking. The art of Explotation (second edition)

Hacking. The art of Explotation (second edition)

eBook

$10.49 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

Kazhdyy programmist po suti svoey — haker. Ved' pervonachal'no hakingom nazyvali poisk iskusnogo i neochevidnogo resheniya. Ponimanie principov programmirovaniya pomogaet nahodit' uyazvimosti, a navyki obnaruzheniya uyazvimostey pomogayut sozdavat' programmy, poetomu mnogie hakery zanimayutsya tem i drugim odnovremenno. Interesnye nestandartnye hody est' kak v tekhnikah napisaniya elegantnyh programm, tak i v tekhnikah poiska slabyh mest. S chego nachat'? CHtoby perezapisyvat' pamyat' s pomoshch'yu perepolneniya bufera, poluchat' dostup k udalennomu serveru i perekhvatyvat' soedineniya vam predstoit programmirovat' na Si i assemblere, ispol'zovat' shell-kod i registry processora, poznakomit'sya s setevymi vzaimodeystviyami i shifrovaniem i mnogoe drugoe. Kak by my ni hoteli verit' v chudo, programmnoe obespechenie i komp'yuternye seti, ot kotoryh zavisit nasha povsednevnaya zhizn', obladayut uyazvimostyami. Mir bez hakerov — eto mir bez lyubopytstva i novatorskih resheniy. Dzhon Erikson

Product Details

ISBN-13: 9785446107124
Publisher: Piter
Publication date: 11/13/2023
Sold by: Bookwire
Format: eBook
Pages: 496
File size: 3 MB
Age Range: 16 Years
Language: Russian
From the B&N Reads Blog

Customer Reviews