Hacking Binary Programs and Exploit Analysis

Author:   Adam Aviv
Publisher:   Taylor & Francis Inc
ISBN:  

9780815392392


Pages:   300
Publication Date:   15 January 2021
Format:   Hardback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $326.00 Quantity:  
Pre-Order

Share |

Hacking Binary Programs and Exploit Analysis


Add your own review!

Overview

This book provides the reader a dynamic educational experience focused on stack based binary exploits. It provides a guide for educators in developing course syllabi and coursework for students. The goal of this book can further the education of important security topics of binary exploits focused on the execution stack of a program. The book will feature rich text descriptions paired with end-of-chapter exercises and comprehensive live examples with a ready-made Virtual Machine image that can be used directly for instruction. Readers will also develop new skills in how to analyze programs for such vulnerabilities, and how to exploit programs to executie arbitrary code.

Full Product Details

Author:   Adam Aviv
Publisher:   Taylor & Francis Inc
Imprint:   CRC Press Inc
ISBN:  

9780815392392


ISBN 10:   0815392397
Pages:   300
Publication Date:   15 January 2021
Audience:   College/higher education ,  General/trade ,  Tertiary & Higher Education ,  General
Format:   Hardback
Publisher's Status:   Forthcoming
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Reviews

Author Information

"Adam J. Aviv is an assistant professor at the United States Naval Academy. He received his Ph.D from the University of Pennsylvania, and his research area is in mobile device authentication. He has worked and published on varied topics, including applied cryptography, network security, and electronic voting. He is perhaps best known for his analysis of vulnerabilities in graphical password on touch screen devices, so call ""smudge attacks."""

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List