Proceedings of the 36th SIGCSE technical symposium on Computer science education
BASS: a benchmark suite for evaluating architectural security systems
ACM SIGARCH Computer Architecture News
The communication unit of measuring device in power engineering
WSEAS TRANSACTIONS on COMMUNICATIONS
Using a secure permutational covert channel to detect local and wide area interposition attacks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A synthetic stegano-crypto scheme for securing multimedia medical records and their associations
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
A general model and guidelines for attack manifestation generation
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
A Comparative Survey on Cryptology-Based Methodologies
International Journal of Information Security and Privacy
Hi-index | 0.00 |
From the Publisher:Emphasizing a true understanding of the techniques as opposed to just breaking the rules, the author helps readers determine which areas are prone to attack and why. Unlike other so-called hacking guides, this book does not gloss over technical details, and includes detailed sections on stack-based overflows, heap based overflows, format string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.