Hacking. The art of Explotation (second edition)
Kazhdyy programmist po suti svoey — haker. Ved' pervonachal'no hakingom nazyvali poisk iskusnogo i neochevidnogo resheniya. Ponimanie principov programmirovaniya pomogaet nahodit' uyazvimosti, a navyki obnaruzheniya uyazvimostey pomogayut sozdavat' programmy, poetomu mnogie hakery zanimayutsya tem i drugim odnovremenno. Interesnye nestandartnye hody est' kak v tekhnikah napisaniya elegantnyh programm, tak i v tekhnikah poiska slabyh mest. S chego nachat'? CHtoby perezapisyvat' pamyat' s pomoshch'yu perepolneniya bufera, poluchat' dostup k udalennomu serveru i perekhvatyvat' soedineniya vam predstoit programmirovat' na Si i assemblere, ispol'zovat' shell-kod i registry processora, poznakomit'sya s setevymi vzaimodeystviyami i shifrovaniem i mnogoe drugoe. Kak by my ni hoteli verit' v chudo, programmnoe obespechenie i komp'yuternye seti, ot kotoryh zavisit nasha povsednevnaya zhizn', obladayut uyazvimostyami. Mir bez hakerov — eto mir bez lyubopytstva i novatorskih resheniy. Dzhon Erikson
"1141315064"
Hacking. The art of Explotation (second edition)
Kazhdyy programmist po suti svoey — haker. Ved' pervonachal'no hakingom nazyvali poisk iskusnogo i neochevidnogo resheniya. Ponimanie principov programmirovaniya pomogaet nahodit' uyazvimosti, a navyki obnaruzheniya uyazvimostey pomogayut sozdavat' programmy, poetomu mnogie hakery zanimayutsya tem i drugim odnovremenno. Interesnye nestandartnye hody est' kak v tekhnikah napisaniya elegantnyh programm, tak i v tekhnikah poiska slabyh mest. S chego nachat'? CHtoby perezapisyvat' pamyat' s pomoshch'yu perepolneniya bufera, poluchat' dostup k udalennomu serveru i perekhvatyvat' soedineniya vam predstoit programmirovat' na Si i assemblere, ispol'zovat' shell-kod i registry processora, poznakomit'sya s setevymi vzaimodeystviyami i shifrovaniem i mnogoe drugoe. Kak by my ni hoteli verit' v chudo, programmnoe obespechenie i komp'yuternye seti, ot kotoryh zavisit nasha povsednevnaya zhizn', obladayut uyazvimostyami. Mir bez hakerov — eto mir bez lyubopytstva i novatorskih resheniy. Dzhon Erikson
10.49
In Stock
5
1
![Hacking. The art of Explotation (second edition)](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.10.4)
Hacking. The art of Explotation (second edition)
496![Hacking. The art of Explotation (second edition)](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.10.4)
Hacking. The art of Explotation (second edition)
496
10.49
In Stock
Product Details
ISBN-13: | 9785446107124 |
---|---|
Publisher: | Piter |
Publication date: | 11/13/2023 |
Sold by: | Bookwire |
Format: | eBook |
Pages: | 496 |
File size: | 3 MB |
Age Range: | 16 Years |
Language: | Russian |
From the B&N Reads Blog