Зарегистрироваться
Восстановить пароль
FAQ по входу

Foster James C. Buffer Overflow Attacks: Detect, Exploit, Prevent

  • Файл формата pdf
  • размером 5,38 МБ
  • Добавлен пользователем , дата добавления неизвестна
  • Описание отредактировано
Foster James C. Buffer Overflow Attacks: Detect, Exploit, Prevent
Getting that skill, on the other hand, has one major roadblock: most people think
that they can learn it. Many knacks in the IT world can be learned. Once you realize
them, they’re yours to keep. But writing a buffer overflow is not like that. It’s more like
weight lifting, or judo.You can learn the basics from a book, or perhaps a short class, but
the landscape you work in changes constantly. Microsoft is adding new protections to
their code every day, as hackers are constantly finding new ways to make exploits more
reliable, and finding ways to develop new types of bugs.Three months after you stop
writing buffer overflows, your skills are ancient history.The hard part about writing
buffer overflows is staring an endless treadmill of work in the face.
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация