Nejnižší cena za posledních 60 dní: 924 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start
Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider's guide to
Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices. Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices,
The King s Indian remains a hugely popular opening unsurprising given the attacking opportunities it offers. In many of the ultra-sharp main lines, White wins the queenside battle but this often turns out to be a Pyrrhic victory as Black wins the war by checkmating on the kingside Black is hunting
This beautifully illustrated guide to the ancient civilization of Mesopotamia, the region between the Tigris and Euphrates rivers, is the perfect companion for travelers and armchair travelers alike. It provides a concise survey of three ancient cultures that have often been misunderstood, both
From the moment motion pictures were invented, fearless entrepreneurs, poverty row profiteers and money-grabbing grifters gave cinemagoers what they truly craved.... the sex, horror and cheap thrills that were too hot for Hollywood to handle. And so the exploitation industry was born. Nothing was
The King s Indian remains a hugely popular opening unsurprising given the attacking opportunities it offers. In many of the ultra-sharp main lines, White wins the queenside battle but this often turns out to be a Pyrrhic victory as Black wins the war by checkmating on the kingside Black is hunting
Attacking Manuals 1 & 2 comprise the first thorough examination of the nature of dynamics in chess, and the principles explained in this book are relevant to every chess game played. In lively no-nonsense language, Aagaard explains how the best players in the world attack. The rules of attack (the
An A-Z guide of the modelling industry focused on ending financial, physical, sexual and emotional exploitation of aspiring and current models by agencies and
All chess-players love to play a smooth attacking game, flowing from start to finish, and sprinkled with spectacular ideas and sacrifices. However, few can do so regularly, and for most players, their collection of brilliancies missed far outweighs their creative successes. Innate talent plays an
High-profile cases of Child Sexual Exploitation have brought the issue under the spotlight but have also resulted in a reactive approach to service development. This book makes the case for greater use of theoretical perspectives in the development and delivery of strategies in the UK and
In the year 2570, a sleeper will wake . . .In the mid-21st century, the Kernel, a strange object on a five-hundred-year-orbit, is detected coming from high above the plane of the solar system. Could it be an alien artefact? In the middle of climate-change crises, there is no mood for
Basic Guide to Dental Procedures, Second Edition provides an essential introduction to the core preventative and restorative treatments routinely carried out in the modern dental practice. Written as a guide for the whole dental team, 'before and after' colour photographs enable the reader to
It's clear now: the Neuronomes are not attacking the Confederation, but rather are the victims of a mysterious aggressor, and they explode when they die. They did, however, take up positions near large population centres, threatening to take thousands of lives with them when they go in order to
Lead into the future effectively with the Governance Core approach! Designed to guide educational leadership past difficult and formidable challenges, the governance system outlined in this book will lead to school districts and schools operating at the highest levels of effectiveness. Davis
The complete, pragmatic guide to building high-value solutions with ASP.NET Core Programming ASP.NET Core is the definitive guide to practical web-based application development with Microsoft's new ASP.NET Core framework. Microsoft MVP Dino Esposito introduces proven techniques and well-crafted
Grandmaster Simon Williams presents an ambitious opening repertoire for Black in the ever-popular French Defence. One of the world's most creative players combines his attacking talent with the traditionally solid French structure, resulting in a powerful armoury of opening weapons. This will prove
The Dragon is one of the most thrilling chess openings and a favorite of attacking players. But can this sharp and provocative system still be played in the modern era? GM Gawain Jones says Yes In this two-volume work, the world s strongest Dragon specialist guides you through the Black repertoire
New in the series Pocket Photo Books - attractive, immersive, compact photo guides - in which Harry Cory Wright explores one of London's iconic sights, Tower
A journey deep into the heart of the trash experience: tales from the underground and exploitation movie scene in America during the 1960s.Trash has always served me well--over the years it has become the outer form and material expression of my dreams: of tomorrow, of life in space, of the