Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
EUR 11,48
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.85.
EUR 34,10
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Publicado por Amsterdam, Elsevier/Syngress,, 2011
ISBN 10: 1597494860 ISBN 13: 9781597494861
Idioma: Inglés
Librería: Baues Verlag Rainer Baues , Bremen, Alemania
EUR 36,00
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carrito23 cm, Hardcover. Condición: Sehr gut. 442 Seiten + Englischer Text. Nur wenige leichte Gebrauchsspuren. Sehr gut. 9781597494861 Sprache: Englisch Gewicht in Gramm: 1020.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 40,65
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Original o primera edición
EUR 45,85
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoCondición: New. 2010. 1st Edition. Paperback. Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them. Num Pages: 466 pages, 1, black & white illustrations. BIC Classification: UL; URH. Category: (P) Professional & Vocational. Dimension: 234 x 192 x 25. Weight in Grams: 858. . . . . .
EUR 37,15
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: New.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 44,55
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 850.
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
EUR 55,99
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoCondición: New. 2010. 1st Edition. Paperback. Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them. Num Pages: 466 pages, 1, black & white illustrations. BIC Classification: UL; URH. Category: (P) Professional & Vocational. Dimension: 234 x 192 x 25. Weight in Grams: 858. . . . . . Books ship from the US and Ireland.
EUR 41,59
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New.
Librería: Bay State Book Company, North Smithfield, RI, Estados Unidos de America
EUR 11,48
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: good. The book is in good condition with all pages and cover intact, including the dust jacket if originally issued. The spine may show light wear. Pages may contain some notes or highlighting, and there might be a "From the library of" label. Boxed set packaging, shrink wrap, or included media like CDs may be missing.
Librería: Bay State Book Company, North Smithfield, RI, Estados Unidos de America
EUR 11,48
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: good. The book is in good condition with all pages and cover intact, including the dust jacket if originally issued. The spine may show light wear. Pages may contain some notes or highlighting, and there might be a "From the library of" label. Boxed set packaging, shrink wrap, or included media like CDs may be missing.
EUR 57,23
Convertir monedaCantidad disponible: 10 disponibles
Añadir al carritoPaperback. Condición: New.
Librería: Best Price, Torrance, CA, Estados Unidos de America
EUR 51,75
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoCondición: New. SUPER FAST SHIPPING.
Librería: Toscana Books, AUSTIN, TX, Estados Unidos de America
EUR 52,60
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.
EUR 87,33
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 1st edition. 442 pages. 9.20x7.50x1.00 inches. In Stock.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 56,31
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 41,46
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 1st edition. 442 pages. 9.20x7.50x1.00 inches. In Stock. This item is printed on demand.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 50,59
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.
Librería: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 42,03
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: new. Questo è un articolo print on demand.