A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...
Security in Sensor Networks
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,...
The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...
|Result Page: 5 4 3 2 1 |