Hacking: The Art of Exploitation Second Edition

Results: 7



#Item
1Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
2

PDF Document

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-06-18 08:37:26
3COMPUTER SECURITY  261 SOCIAL HACKING (ALSO KNOWN AS SOCIAL ENGINEERING)

COMPUTER SECURITY 261 SOCIAL HACKING (ALSO KNOWN AS SOCIAL ENGINEERING)

Add to Reading List

Source URL: www.privacytactics.com

Language: English - Date: 2012-08-13 12:49:14
4Shellzer: a tool for the dynamic analysis of malicious shellcode Yanick Fratantonio1 , Christopher Kruegel2 , and Giovanni Vigna2 1 Politecnico di Milano, Italy [removed]

Shellzer: a tool for the dynamic analysis of malicious shellcode Yanick Fratantonio1 , Christopher Kruegel2 , and Giovanni Vigna2 1 Politecnico di Milano, Italy [removed]

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2013-07-29 17:43:47
5Part 1: Jumping into C++ ...................................................................................................................................................... 2  Chapter 1: Chapter 2:

Part 1: Jumping into C++ ...................................................................................................................................................... 2 Chapter 1: Chapter 2:

Add to Reading List

Source URL: www.cprogramming.com

Language: English - Date: 2012-12-10 11:35:10
6

PDF Document

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-28 10:35:48
7

PDF Document

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2010-07-13 13:39:02