Security Power ToolsBryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch "O'Reilly Media, Inc.", 2007. gada 27. aug. - 860 lappuses What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
|
No grāmatas satura
1.–5. rezultāts no 69.
... Not Fuzzing 748 23. Binary Reverse Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749 23.1 Interactive Disassembler 749 23.2 Sysinternals 23.3 OllyDbg 23.4 Other Tools 775 776 781 Index ...
... Binary Reverse Engineering as well as a portion of Chapter 8, Wireless Penetration. I have been with Juniper Networks for the past two years. Prior to coming here, I did security and reverse engineering work for Internet Security ...
... Binary Reverse Engineering, by Michael Lynn. This chapter covers the art of binary reverse engineering using tools such as Interactive Disassembler and Ollydbg. I present you with a case study in which I show you how to find real bugs ...
... binary code, which he decompiled. Decompiling publicly distributed code doesn't violate trade secret law. Could the product flaw itself be a protected trade secret? 4 Chapter 1: Legal and Ethics Issues 1.1 1.1 Core Issues.
... binary with an End User License Agreement (EULA) that prohibits reverse engineering. What legal effect does such a EULA term have? Probably 99.9 percent of people in the world who purchase software do not care to reverse engineer it ...
Saturs
Part V | 383 |
Firewalls | 385 |
Host Hardening | 421 |
Securing Communications | 455 |
Email Security and AntiSpam | 525 |
Device Security Testing | 576 |
Part VI | 605 |
Network Capture | 607 |
Metasploit | 193 |
Wireless Penetration | 225 |
Exploitation Framework Applications | 242 |
Custom Exploitation | 268 |
Part IV | 321 |
Backdoors | 323 |
Rootkits | 363 |
Network Monitoring | 640 |
Host Monitoring | 664 |
Part VII | 697 |
Forensics | 699 |
Application Fuzzing | 725 |
Binary Reverse Engineering | 749 |
Index | 783 |
Citi izdevumi - Skatīt visu
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Stisa Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |