Stock Image

0day security: vulnerability analysis software (1 CD)

WANG QING /failwest

ISBN 10: 7121060779 / ISBN 13: 9787121060779
New Condition: New paperback
From liu xing (JiangSu, JS, China)

AbeBooks Seller Since April 7, 2009

Seller Rating 5-star rating

Quantity Available: 10

Available from more sellers

View all  copies of this book
Buy New
List Price: US$
Price: US$ 74.63 Convert Currency
Shipping: US$ 10.00 From China to U.S.A. Destination, Rates & Speeds
Add to basket

30 Day Return Policy

Payment Methods
accepted by seller

Visa Mastercard American Express

PayPal Bank/Wire Transfer

About this Item

Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 16358 Publisher: Electronic Industry Press. Pub. Date: 2008-04 This book is divided into four 17 chapters. the system comprehensive introduction to the Windows platform. buffer overflow analysis. detection and prevention. The first article of common tools and basic knowledge of the introduction; second from the perspective of the attacker. the attacker exploited Secret common trick to understand the knowledge of the computer emergency response and improve the safety-critical software products; third in the second. based on the perspective from the security experts presented vulnerability analysis and computer emergency response knowledge; fourth point. standing about how software engineers in the development. testing. software lifecycle link added safety factor to enhance the security of software products. Contents: Part 1 Basics Chapter 1 Overview 1.1 bug flaws and loopholes in a few puzzling 1.2 1.3 security vulnerability discovery. vulnerability analysis. vulnerability exploits 1.4 0day response to the publication and Chapter 2 Overview 2.1 pe binary file 2.2 Virtual Memory 2.3 pe format files and virtual memory mapping between the essential tool for Chapter 3 Introduction 3.2 softice 3.1 ollydbg About 3.3 windbg Introduction 3.5 Introduction 3.4 idapro binary editor 3.6 Introduction 3.7 crack virtual machine binary file exploits the first two first 4 stack overflow stack using the system works 4.1 4.1.1 4.1.2 stack memory the different uses of the system function call stack 4.1.3 4.1.4 What happens when you register stack frame with the function calling convention with a function related to 4.1.5 commandFour Satisfaction guaranteed,or money back. Bookseller Inventory # J81750

Ask Seller a Question

Bibliographic Details

Title: 0day security: vulnerability analysis ...

Binding: paperback

Book Condition:New

Store Description

Thank you for visiting My bookstore! We are an online bookstore, and Is the China's largest online book sales. Generally our books are from China, with reasonable price and decent printing quality. We are always trying our best to satisfy customer's needs!

Visit Seller's Storefront

Terms of Sale:

We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...

More Information
Shipping Terms:

Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.

List this Seller's Books