MARC 닫기
00000cam c2200205Ic 4500
000001175176
20240314200225
ta
240310s2022 us a b 000c0 eng d
▼a 9781733003957
▼q paperback
▼a 1733003959
▼q paperback
▼a (KERIS)REF000020366916
▼a BRX
▼b eng
▼c BRX
▼d UKOBU
▼d OCLCQ
▼d 211070
▼a QA76.9.A25
▼a QA76.9.A25
▼b D987
▼a Computer security :
▼b a hands-on approach /
▼d Wenliang Du
▼a 3rd th.
▼a Bolton, ON :
▼b Amazon.ca,
▼c 2022
▼a 519 p. :
▼b ill. ;
▼c 24 cm
▼a "Independently published. First printing: May 2022." -- page [ii]
▼a Includes bibliographical references (pages 509-519)
▼a 1. Software security -- 2. Set-UID programs -- 3. Environment variables and attacks -- 4. Buffer overflow attack -- 5. Return-to-libc attack and ROP -- 6. Format string vulnerability -- 7. Race condition vulnerability -- 8. Dirty COW -- 9. Shellcode -- 10. Reverse shell -- 11. Web security basics -- 12. Cross-site request forgery -- 13. Cross-site scripting attack -- 14. SQL injection attack -- 15. Clickjacking attacks -- 16. Shellshock attack -- 17. Meltdown attack -- 18. Spectre attack -- 19. Secret-key encryption -- 20. One-way hash function -- 21. Public key cryptography -- 22. Public key infrastructure
▼a Computer security
▼a User-centered system design
▼a Computer networks
▼x Security measures
▼a Computer Security
▼0 (DNLM)D016494
▼a Sécurité informatique.
▼0 (CaQQLa)201-0061152
▼a Conception participative (Conception de systèmes)
▼0 (CaQQLa)201-0443942
▼a Réseaux d'ordinateurs
▼x Sécurité
▼x Mesures.
▼0 (CaQQLa)201-0263812
▼a Computer networks
▼x Security measures.
▼2 fast
▼0 (OCoLC)fst00872341
▼a Computer security.
▼2 fast
▼0 (OCoLC)fst00872484
▼a User-centered system design.
▼2 fast
▼0 (OCoLC)fst01740021
▼a Du, Wenliang,
▼e author
▼a 단행본
| 자료유형 : | 단행본 |
|---|---|
| ISBN : | 9781733003957 |
| ISBN : | 1733003959 |
| 분류기호 : | QA76.9.A25 |
| 서명/저자사항 : | Computer security : a hands-on approach / Wenliang Du |
| 판사항 : | 3rd th. |
| 발행사항 : | Bolton, ON : Amazon.ca, 2022 |
| 형태사항 : | 519 p. : ill. ; 24 cm |
| 일반주기 : | "Independently published. First printing: May 2022." -- page [ii] |
| 서지주기 : | Includes bibliographical references (pages 509-519) |
| 내용주기 : | 1. Software security -- 2. Set-UID programs -- 3. Environment variables and attacks -- 4. Buffer overflow attack -- 5. Return-to-libc attack and ROP -- 6. Format string vulnerability -- 7. Race condition vulnerability -- 8. Dirty COW -- 9. Shellcode -- 10. Reverse shell -- 11. Web security basics -- 12. Cross-site request forgery -- 13. Cross-site scripting attack -- 14. SQL injection attack -- 15. Clickjacking attacks -- 16. Shellshock attack -- 17. Meltdown attack -- 18. Spectre attack -- 19. Secret-key encryption -- 20. One-way hash function -- 21. Public key cryptography -- 22. Public key infrastructure |
| 일반주제명 : | Computer security -- |
| 일반주제명 : | User-centered system design -- |
| 일반주제명 : | Computer networks -- Security measures -- |
| 일반주제명 : | Computer Security -- |
| 일반주제명 : | Sécurité informatique. -- |
| 일반주제명 : | Conception participative (Conception de systèmes) -- |
| 일반주제명 : | Réseaux d'ordinateurs -- Sécurité -- Mesures. -- |
| 일반주제명 : | Computer networks -- Security measures. -- |
| 일반주제명 : | Computer security. -- |
| 일반주제명 : | User-centered system design. -- |
| 개인저자 : | Du, Wenliang, author |
| 언어 | 영어 |
서평쓰기