|
|
|
|
LEADER |
01350cam a2200265 7i4500 |
001 |
0000037271 |
005 |
20220404090000.0 |
008 |
211122s may eng |
020 |
|
|
|a 9781733003926
|
040 |
|
|
|a Worldcat
|b eng
|c Worldcat
|d JKR
|e rda
|
090 |
0 |
0 |
|a QA76.9.A25
|b D8 2019
|
100 |
1 |
|
|a Du, Wenliang
|e author
|
245 |
1 |
0 |
|a Computer and Internet security
|b a hands-on approach
|c Wenliang Du
|
250 |
|
|
|a Second edition
|
264 |
|
0 |
|a ♭2019
|
300 |
|
|
|a xxx, 657 pages
|b illustration
|c 24 cm
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a unmediated
|2 rdamedia
|
338 |
|
|
|a volume
|2 rdacarrier
|
500 |
|
|
|a Includes bibliographical
|
505 |
8 |
|
|a Pt. 1: Software security -- Set-UID programs--Environment variables and attacks -- Shellshock attack --Buffer overflow attack -- Return-to-libc attack and ROP --Format string vulnerability -- Race condition vulnerability -- Dirty COW -- Reverse shell -- Pt. 2: Web security -- Cross-site request forgery -- Cross-site scripting attack -- SQL injection attack -- Pt. 3:Hardware security -- Meltdown attack --Spectre attack -- Pt. 4: Cryptography -- Secret-key encryption -- One-way hash function -- Public key cryptography -- Public key infrastructure
|
650 |
1 |
0 |
|a User-centered system design
|
650 |
1 |
0 |
|a Internet
|
650 |
1 |
0 |
|a Computer security
|
999 |
|
|
|a 19085
|b Book
|c General Collection
|e JKR Library
|