Nuevo:
-21% US$41.69
Entrega el sábado, 19 de octubre
Enviado por: Amazon.com
Vendido por: Amazon.com
US$41.69 con 21 porcentaje de ahorro
Precio recomendado: US$52.95
El Precio listado es el precio de venta sugerido de un nuevo producto tal como lo proporciona un fabricante, proveedor o vendedor. Excepto para los libros, Amazon mostrará un Precio listado si los clientes compraron el producto en Amazon o si otros minoristas lo ofrecieron al Precio listado o a un precio superior al menos en los últimos 90 días. Los precios listados pueden no reflejar necesariamente el precio de mercado actual del producto.
Más información
Devoluciones internacionales gratis
US$11.83 de cargos de envío e importación a Canadá Detalles

Detalles de envío y tarifa

Precio US$41.69
Envío de AmazonGlobal US$9.66
Cargos estimados de importación US$2.17
Total US$53.52

Entrega el sábado, 19 de octubre
Sólo hay 3 disponible(s).
US$US$41.69 () Incluye las opciones seleccionadas. Incluye el pago mensual inicial y las opciones seleccionadas. Detalles
Precio
Subtotal
US$US$41.69
Subtotal
Desglose inicial del pago
Se muestran los gastos de envío, la fecha de entrega y el total del pedido (impuestos incluidos) al finalizar la compra
Enviado por
Amazon.com
Enviado por
Amazon.com
Vendido por
Amazon.com
Vendido por
Amazon.com
Devoluciones
Reintegro o reemplazo en 30 días
Reintegro o reemplazo en 30 días
Este artículo se puede devolver en su estado original para obtener un reintegro o reemplazo completo dentro de los 30 días posteriores a la recepción.
Devoluciones
Reintegro o reemplazo en 30 días
Este artículo se puede devolver en su estado original para obtener un reintegro o reemplazo completo dentro de los 30 días posteriores a la recepción.
Pago
Transacción segura
Tu transacción es segura
En Amazon, nos esforzamos por proteger tu seguridad y privacidad. Nuestro sistema de seguridad de pagos encripta tu información durante la transmisión de datos. No compartimos los datos de tu tarjeta de crédito con vendedores externos, ni vendemos tu información a terceros. Más información
Pago
Transacción segura
En Amazon, nos esforzamos por proteger tu seguridad y privacidad. Nuestro sistema de seguridad de pagos encripta tu información durante la transmisión de datos. No compartimos los datos de tu tarjeta de crédito con vendedores externos, ni vendemos tu información a terceros. Más información
US$20.25
Quality checked pre-owned articles. Edition in good condition, may show traces of usage. Quality checked pre-owned articles. Edition in good condition, may show traces of usage. Ver menos
Entrega por US$16.95 entre el 4 - 26 de noviembre. Ver detalles
Disponible
US$US$41.69 () Incluye las opciones seleccionadas. Incluye el pago mensual inicial y las opciones seleccionadas. Detalles
Precio
Subtotal
US$US$41.69
Subtotal
Desglose inicial del pago
Se muestran los gastos de envío, la fecha de entrega y el total del pedido (impuestos incluidos) al finalizar la compra
No se garantizan códigos de acceso ni suplementos con artículos usados.
Vendido y enviado por momox Shop.
Agregado a

Lo sentimos; hubo un problema.

Hubo un error al recuperar tus Listas de Deseos. Por favor inténtalo de nuevo.

Lo sentimos; hubo un problema.

Lista no disponible.
Imagen del logotipo de la aplicación Kindle

Descarga la app de Kindle gratis y comienza a leer libros Kindle al instante desde tu smartphone, tablet o computadora, sin necesidad de ningún dispositivo Kindle.

Lee al instante desde tu navegador con Kindle para la web.

Usando la cámara de tu celular escanea el siguiente código y descarga la aplicación Kindle.

Código QR para descargar la App Kindle

Seguir al autor

Ocurrió un error. Intenta realizar tu solicitud de nuevo más tarde.

A Guide to Kernel Exploitation: Attacking the Core 1st Edición

4.4 4.4 de 5 estrellas 46 calificaciones

{"desktop_buybox_group_1":[{"displayPrice":"US$41.69","priceAmount":41.69,"currencySymbol":"US$","integerValue":"41","decimalSeparator":".","fractionalValue":"69","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"59bn8cmYHpFKuvTPJU74x01uKgE4zMyzDzve4OXb9yr9q9usSs%2B63Wh4ROZMGgOsT0m22ouc%2B%2F%2ByZJPHn0yAh9tV1woIjnVuYlsn3aR%2BvavkAr7NB6F4QH0CGjgva5An0vSNU9SCn3c%3D","locale":"es-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"US$20.25","priceAmount":20.25,"currencySymbol":"US$","integerValue":"20","decimalSeparator":".","fractionalValue":"25","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"59bn8cmYHpFKuvTPJU74x01uKgE4zMyzhx3N%2BM95Q9tNSexgtIW%2BbCqi7C6YZrmzwbtnaveOdxW5sQpQ0cS5dJmtYfBr5BMMJWGMmGT6UPw04dVuKoaEkiGECDbjTOmEINr1SdteOz098CVafHcZST%2BdP3feQ%2BAN1ZTQZ3CyaAYMMSw8AMGHmM%2B6Tn9NgHGK","locale":"es-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Opciones de compra y productos Add-on

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.

The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.
  • Covers a range of operating system families ― UNIX derivatives, Mac OS X, Windows
  • Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions
  • Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

Comprados juntos habitualmente

Este producto: A Guide to Kernel Exploitation: Attacking the Core
US$41.69
Sólo hay 3 disponible(s).
Vendido y enviado por Amazon.com.
+
US$44.00
Disponible
Vendido y enviado por Amazon.com.
Precio total: $00
Para consultar nuestro precio, agrega estos elementos a tu carrito
Detalles
Agregado al carrito
spCSRF_Treatment
Algunos de estos productos se envian antes que los otros.
Elige artículos para comprar juntos.

Opiniones editoriales

Críticas

"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC

Críticas

Learn how kernel exploits expose operating system vulnerabilities and give the attacker complete control!

Detalles del producto

  • Editorial ‏ : ‎ Syngress; 1er edición (29 Septiembre 2010)
  • Idioma ‏ : ‎ Inglés
  • Tapa blanda ‏ : ‎ 464 páginas
  • ISBN-10 ‏ : ‎ 1597494860
  • ISBN-13 ‏ : ‎ 978-1597494861
  • Dimensiones ‏ : ‎ 7.4 x 1.1 x 9.1 pulgadas
  • Opiniones de clientes:
    4.4 4.4 de 5 estrellas 46 calificaciones

Sobre el autor

Sigue a los autores para recibir notificaciones de sus nuevas obras, así como recomendaciones mejoradas.
Enrico Perla
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Descubre más libros del autor, ve autores similares, lee recomendaciones de libros y más.

Opiniones de clientes

4.4 de 5 estrellas
46 calificaciones globales

Opiniones destacadas de los Estados Unidos

Calificado en Estados Unidos el 19 de octubre de 2010
I bought this book in hopes of finding an informative and thought provoking look at kernel exploitation - I was not disappointed. Aside from a few minor typos, I found this book to be one of the most well written books on exploitation that I have read. I have recommended it to some fellow students and a professor (I am a graduate student in computer science). I highly recommend this book for anybody that is interested in kernel exploitation. In my opinion, this book is currently the best source of information on exploiting the kernel since Phrack #64 file 6.
Calificado en Estados Unidos el 4 de agosto de 2018
This book gives very clear guidance to show how to develop exploitation attacking OS kernel. I really love it. But the website hosting source code of this book is down. I don't know where to down load the source code. If there is another source to download the source code that would be awesome.
Calificado en Estados Unidos el 16 de septiembre de 2024
Ignoring the obvious issue with this being extremely dated back to Windows Vista the content is still somewhat valuable. I do wish there was a 2nd edition, but having bought and read this in 2024 it was still a useful experience. Just not as useful as I would have liked.
Calificado en Estados Unidos el 3 de diciembre de 2014
This book is the best book I've ever read. No, but seriously, its like the keys to the kingdom. The authors do a great job of giving you a foundation in the starting chapters (however, it is very helpful if you have a coding background and have some knowledge of how and kernel/processor works, generally). I'm about half way through the book and I have learned so much about exploitation - this book is priceless.
Calificado en Estados Unidos el 26 de enero de 2016
Gift that was appreciated and still being reviewed.
Calificado en Estados Unidos el 16 de noviembre de 2010
This was the first kernel related book I've read and it was very approachable an easy to understand.
Each section breaks the necessary information down into understandable pieces. The background info provided is very useful for someone with no kernel background. However the amount of general kernel information was 50% of the book. For people who have some kernel background this book would most likely bore them to death.
Calificado en Estados Unidos el 4 de octubre de 2010
My colleague showed me this book (full disclosure: he was a reviewer) - he made his students buy it it for his OS II class (assigned middle of the semester!) one week ago - hot off the presses. I got two copies, one for my office and one for reading on the bus.

It's one of three technical exploit books I'd take on a deserted, networked, powered island. Part 1: Journey into Kernel Land (Intro and explanations) is one of the most succinct clear intros I have ever seen. I wish I could distributed that as a document for class. The section on Windows is current and well done, also because the difference between 32 and 64 bit architectures and approaches are emphasized (this is not the case with Eilam's book alas, though very good) - this book is up to date. I think the Unix section needs to be updated, though, my colleague said that some of the exploits were possible in 2006/2007 but with kernel changes some APIs are not available etc. This needs to be updated. Cannot comment on the Mac section, because no expertise.

Website available and examples useful: [...]

Wishlist:

1) There are some unavoidable typos, sure: p.10: MAC is nor Media Access Control in a security context, it's Mandatory Access Control
2) I would have really really like an expanded section on hypervisors and virtualization (there is a mini epilogue on it at the end)- that would have made my day
3) The Linux case study was neat - for next version, do Windows Stuxnet's m.o. because it adds all sorts of interesting kernel root attack pathways

You will not regret buying this book - it is obvious and much appreciated that the authors put a lot of effort into making an readable guide for the medium to expert reader that can double as a textbook companion.

Daniel Bilar
CS Department
UNO
A 21 personas les resultó útil
Reportar
Calificado en Estados Unidos el 16 de agosto de 2018
is nice but is like just with C and leave a side more languages

Opiniones más destacadas de otros países

Traducir todas las opiniones al Español
Benedict S
5.0 de 5 estrellas Sehr gutes Buch um reinzukommen
Calificado en Alemania el 14 de enero de 2019
Das Buch ist zwar schon etwas älter, aber um die Grundlagen zu lernen sehr gut. Es ist sehr ausführlich und sehr gut geschrieben. Leider ist das Englisch teilweise schwer zu verstehen (ich bin nicht der beste) weswegen man Sachen manchmal öfter lesen muss. Aber dafür gibt es ja die deutsche Version. Alles in allem ein sehr gutes umfangreiches Buch um in das Thema einzusteigen.
Exiled-Edik
5.0 de 5 estrellas A technological tour de force
Calificado en Reino Unido el 5 de enero de 2012
Coming from a background in IT security and with a reasonable understanding of system architectures I found this book to be an absolutely refreshing change from the standard regurgitated offerings that are dominating the field due to nothing better being available.

This book gives you a solid understanding of a wide range of kernel (and application) level security flaws to a level where you would feel comfortable discussing this not with your average IT security consultant (who would be lost soon after stack overflow) but with serious and dedicated professionals working at the bleeding edge of OS security.

I cannot recommend this book highly enough. However it does assume a background of being able to follow C code (or at least understand the algorithmic flow), elementary Data structures (pointers, lists) and fundamentals of OS design (try Operating Systems by Deitel for a good core intro). Some assembly might help as well. But don't let that put you off... it's not absolutely necessary.

It genuinely is one of those books where you think 'WOW.. I wish I wrote that!'.

Nothing in the field comes closer to delivering what this book does.

As you may have guessed. Highly recommended.