您现在的位置是:首页 > 手册 > A_Guide_to_Kernel_Exploitation
推荐星级:
  • 1
  • 2
  • 3
  • 4
  • 5

A_Guide_to_Kernel_Exploitation

更新时间:2013-02-24 11:39:37 大小:5M 上传用户:biiigfish查看TA发布的资源 标签:A_Guide_to_Kernel_Exploitation 下载积分:2分 评价赚积分 (如何评价?) 打赏 收藏 评论(0) 举报

资料介绍

A Guide to Kernel Exploitation,Attacking the Core --- With the number of security countermeasures against user-land exploitation greater than ever these days, kernel-level exploitation is becoming increasingly popular among attackers and, generically, exploit writers. Playing with the heart of a com- puter’s operating system can be a dangerous game. This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems—namely, UNIX deriva- tives, Mac OS X, and Windows.

部分文件列表

文件名 大小
A_Guide_to_Kernel_Exploitation.pdf 5M

全部评论(0)

暂无评论

上传资源 上传优质资源有赏金

  • 打赏
  • 30日榜单

推荐下载