当前位置:
首页
>
电子教材
>
详细信息
快速检索
数据库:
各中心已购纸本教材
各中心已购电子教材
国内高校课程
国外著名大学课程
外文原版教材出版信息
外文影印版教材出版信息
名校购书信息
关键词:
Attack and Defend Computer Security Set
书目信息
ISBN:
9781118906736
本馆索书号:
中图分类号:
TP3
中文译名:
作者:
Dafydd Stuttard
编者:
语种:
英语
出版信息
出版社:
Wiley
出版地:
出版年:
2014
版本:
版本类型:
原版
丛书题名:
卷期:
文献信息
关键词:
前言:
摘要:
Web Application Hacker's Handbook 2e. There have been two broad trends that have evolved since the first edition and will be covered in detail in this edition: Various new and modified technologies have appeared that are being used in web applications, including new remoting frameworks, HTML5, cross-domain integration techniques. Many new attack techniques have been developed, particularly in relation to the client side, including UI redress (clickjacking), framebusting, HTTP parameter pollution, XML external entity injection, bypasses for new browser anti-XSS filters, hybrid file (GIFAR) attacks. The web site to accompany the book contains: Code appearing in the book. Answers to the questions posed at the end of each chapter Links to tools discussed in the book. A summarized methodology and checklist of tasks Malware Analyst's Cookbook and DVD is a collection of problems, solutions, and practical examples designed to enhance the analytical capabilities of anyone who works with malware. Whether you're tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you achieve your goals more quickly and accurately. The book goes beyond how to tackle challenges using free or inexpensive tools. It also includes a generous amount of source code in C, Python, and Perl that show how to extend your favorite tools or build your own from scratch. Complete coverage of: Classifying Malware, Manipulation of PE files, Packing and Unpacking, Dynamic Malware Analysis, Analyzing Malicious Documents, Analyzing Shellcode, Analyzing Malicious URLs, Open Source Malware Research, Decoding and Decrypting, Analysis Tool Development, Attack Code, Working with DLLs, AntiRCE, AntiDebugging, AntiVM, Basics of Static analysis with IDA, Basics of Dynamic Analysis with Immunity/Olly, Physical memory forensics, Live/system forensics, Inter-process communication. The DVD contains original, never-before-published custom programs from the authors to demonstrate concepts in the recipes. This tool set will include files required to complete reverse-engineering challenges and files required for the reader to follow along with exhibits/figures in the book.
内容简介:
目次:
全文链接:
http://www.itextbook.cn/f/book/bookDetail?bookId=20ccbcade69145d1a84b462e2cb92979
读者对象:
实体信息
页码:
其它信息
原版ISBN:
书评:
扩展信息
相关附件