An edition of Forbidden Code (2004)

Forbidden Code

Überarbeitete Auflage
  • 0 Ratings
  • 4 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 4 Want to read
  • 0 Currently reading
  • 0 Have read

Buy this book

Last edited by Jenner
September 11, 2021 | History
An edition of Forbidden Code (2004)

Forbidden Code

Überarbeitete Auflage
  • 0 Ratings
  • 4 Want to read
  • 0 Currently reading
  • 0 Have read

Dieses Buch beschreibt verschiedene Methoden, wie man in Computersysteme einbrechen kann. Es besteht hauptsächlich aus 3 Teilen: Programmierung (Buffer-Overflows, Format-Strings, ...), Netzwerke (Port-Scanning, Denial-of-Service, ...) und Kryptologie (Verschlüsselungsmethoden, Passwörter cracken, ...)

Publish Date
Publisher
mitp-Verlag
Language
German
Pages
282

Buy this book

Edition Availability
Cover of: Forbidden Code
Forbidden Code
2006, mitp-Verlag
Paperback in German - Überarbeitete Auflage
Cover of: Forbidden Code.
Forbidden Code.
Mar 31, 2004, mitp-Verlag

Add another edition?

Book Details


Table of Contents

Vorwort. 7
Danksagungen. 9
0x100 Einleitung. 11
0x200 Programmierung. 17
2.1 Was ist Programmierung?. 18
2.2. Programme ausnutzen. 22
2.3 Allgemeine Angriffstechniken. 26
2.4 Dateiberechtigungen für Multiuser-Betriebssysteme. 26
2.5 Speicher. 28
2.6 Buffer-Overflow (Pufferüberlauf). 35
2.7 Stack-basierter Overflow. 36
2.8 Heap- und BSS-basierte Overflows. 57
2.9 Format-Strings. 71
2.10 Shellcode programmieren. 106
2.11 Der Rücksprung zu libc. 158
0x300 Netzwerke. 171
3.1 Was bedeutet Netzwerk?. 171
3.2 Interessante Schichten im Detail. 174
3.3 Netzwerke sniffen. 179
3.4 TCP-/IP-Hijacking. 190
3.5 Denial-of-Service. 195
3.6 Port-Scanning. 198
0x400 Kryptologie. 211
4.1 Informationstheorie. 212
4.2 Algorithmenlaufzeit. 215
4.3 Symmetrische Verschlüsselung. 217
4.4 Asymmetrische Verschlüsselung. 219
4.5 Hybride Verschlüsselung. 226
4.6 Passwörter cracken. 239
4.7 802.11b-Wireless-LAN-Verschlüsselung. 256
4.8 WEP-Angriffe. 259
0x500 Zusammenfassung. 275
Stichwortverzeichnis. 279

Edition Notes

Published in
Bonn, Germany
Copyright Date
2006
Translation Of
Hacking. The Art of Exploitation
Translated From
English

Contributors

Translator
Ian Travis
Proofreader
Ernst H. Pröfener
Redakteur
Astrid Sander

The Physical Object

Format
Paperback
Pagination
282p
Number of pages
282
Dimensions
21 x 15 x 2.5 centimeters
Weight
450 grams

ID Numbers

Open Library
OL24636543M
ISBN 10
3826616677
ISBN 13
9783826616679

Excerpts

Der Begriff "Hacking" ruft stilisierte Bilder von elektronischen Vandalismus, Spionage, gefärbten Haaren und Körper-Piercings hervor.
Page 11, added by Andreas Perstinger.

Erster Satz aus der Einleitung

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
September 11, 2021 Edited by Jenner Merge works
September 11, 2021 Edited by Jenner merge authors
April 24, 2011 Edited by Andreas Perstinger New book added
April 24, 2011 Created by 85.127.208.148 Added new book.