Buffer overflow attacks : Detect, exploit, prevent
Saved in:
Main Author: | Foster, James C. |
---|---|
Format: | TEXT |
Language: | Asing |
Published: |
Syngress Publishing, Inc.
2005
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The Shellcoder's Handbook :
Discovering and Exploiting security Holes
by: Anley, Chris
Published: (2007) -
RANCANG BANGUN SISTEM FUZZER DENGAN TEKNIK BUFFER OVERFLOW UNTUK MENGETAHUI VULNERBILITY APLIKASI PADA WINDOWS
by: Sri Redjeki, et al.
Published: (2015) -
The Norton Antivirus :
Virus protection, detection and elimination for the IBM PC and compatibles
by: Symantec
Published: () -
Intrusion Detection & Prevention
by: ENDORF, Carl
Published: (2004) -
Fraud : Prevention and Detection
by: Huntington, I.K.
Published: (1992)