Description: The book is divided into five 33-chapter, system, comprehensive introduction to the Windows platform buffer overflow vulnerability analysis, detection and prevention. First for the vulnerabilities exploit the basic theory and primary technology, can lead the reader quickly entry second researchers at home and abroad on the basis of the first combined cutting-edge achievements, of vulnerabilities technology from attack, anti-two aspects summary Title III standing on the point of view of safety testing, and discuss the types of commonly used software vulnerability mining methods and ideas Part IV technology to fill the books in this mysterious area of the Windows kernel security and offensive and defensive knowledge gaps V 0 day case analysis, and various ways of thinking to help readers understand before four. The book can be used as a reference guide for network security practitioners, hackers technology enthusiasts, but also can be used as a network security profe
To Search:
File list (Check if you may need any files):
0day_2nd.pdf