<Embed>
100% PP 100% PP
   1,989.00
  • M.R.P.:    2,758.00
  • You Save:    769.00 (28%)
  • Inclusive of all taxes
FREE Delivery.
Pay on Delivery (Cash/Card) eligible
What is this?
What is Pay on Delivery (Cash/Card)?
Pay on Delivery (Cash/Card) payment method includes Cash on Delivery (COD) as well as Debit card / Credit card / Net banking payments at your doorstep.
Only 1 left in stock (more on the way).
Sold by Cloudtail India (4.5 out of 5 | 74,113 ratings) and Fulfilled by Amazon. Gift-wrap available.
List & Earn Rs.250* extra. Available in Bangalore, Mumbai, Chennai, Hyderabad. Sell on Local Finds.
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more.
See all 2 images

A Guide to Kernel Exploitation: Attacking the Core Paperback – 28 Oct 2010


See all 2 formats and editions Hide other formats and editions
Price
New from
Paperback
   1,989.00
   1,989.00
click to open popover

Save Extra with 3 offers

  • Cashback (2): Get 50% cashback up to Rs. 50 using Axis Bank Credit & Debit Cards. Valid only on your first 2 online payments. Cashback will be credited as Amazon Pay balance within 10 days from purchase. Here's how
  • Get 25% back up to Rs. 50 back on your first order using Amazon Pay UPI. Cashback within 10 days. Link Bank Account Here's how
  • No Cost EMI: No Cost EMI available on Amazon Pay ICICI credit cards on orders above Rs. 3000 Here's how
  • Bank Offer: 5% Instant Discount on ICICI bank Credit and Debit EMI transactions Here's how

Product description

Review

"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC

From the Back Cover

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families—UNIX derivatives, Mac OS X, and Windows—and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.

See all Product description

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone

To get the free app, enter mobile phone number.

kcpAppSendButton


Product details

  • Paperback: 464 pages
  • Publisher: Syngress; 1 edition (28 October 2010)
  • Language: English
  • ISBN-10: 1597494860
  • ISBN-13: 978-1597494861
  • Product Dimensions: 19.1 x 2.4 x 23.5 cm
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #2,81,539 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?


No customer reviews


Review this product

Share your thoughts with other customers

Most helpful customer reviews on Amazon.com

Amazon.com: 4.1 out of 5 stars 20 reviews
Qingyun Li
5.0 out of 5 starsI really love it. But the website hosting source code of ...
4 August 2018 - Published on Amazon.com
Verified Purchase
Julio
3.0 out of 5 starsso so
16 August 2018 - Published on Amazon.com
Verified Purchase
Blake
5.0 out of 5 starsAn excellent book on kernel exploitation
19 October 2010 - Published on Amazon.com
Verified Purchase
8 people found this helpful.
Duderino
5.0 out of 5 starsThis book is the best book I've ever read
3 December 2014 - Published on Amazon.com
Verified Purchase
2 people found this helpful.
T. Emmert
4.0 out of 5 starsEasy reading
16 November 2010 - Published on Amazon.com
Verified Purchase
2 people found this helpful.