Presents a guide to computer hacking, including step-by-step information on exploiting sloppy programming, using buffer overflows and format strings, writing code, redirecting network traffic, and cracking encryptions, and contains core techniques and clever tricks to create new hacks and defend against potential attacks. Accompanying LiveCD provides a complete Linux programming and debugging environment.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
3904985 | 7184564 | 2293 | 870373 | 990822 | BRHS | 114 | BRHS73007 | 005.8 ERI | 5.8 | 1736518457 | 1736518457 |