1 / 465
文档名称:

A Guide To Kernel Exploitation Attacking The Core, Perla, Oldani, Syngress, 2011.pdf

格式:pdf   页数:465
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

A Guide To Kernel Exploitation Attacking The Core, Perla, Oldani, Syngress, 2011.pdf

上传人:bolee65 2014/5/2 文件大小:0 KB

下载得到文件列表

A Guide To Kernel Exploitation Attacking The Core, Perla, Oldani, Syngress, 2011.pdf

文档介绍

文档介绍:A Guide to Kernel
Exploitation
This page intentionally left blank
A Guide to Kernel
Exploitation
Attacking the Core
Enrico Perla
Massimiliano Oldani
Technical Editor
Graham Speake
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
•••
NEW YORK OXFORD PARIS SAN DIEGO SYNGRESS
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO ®
Syngress is an imprint of Elsevier
Acquiring Editor: Rachel Roumeliotis
Development Editor: Matthew Cater
Project Manager: Julie Ochs
Designer: Alisa Andreola
Syngress is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
© 2011 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further
information about the Publisher’s permissions policies and our arrangements anizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our
website: missions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods or professional practices, may e necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information or methods described herein. In using such information or methods they should be mindful
of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a ma