Computer & Internet security : a hands-on approach
Wenliang Du
- 2nd ed.
- [Place of publication not identified] : c2019.
- XXX, 657 p. : ill. ; 24 cm.
Includes bibliographical references (pages 409-418) and index.
Pt. 1: Software security -- Set-UID programs -- Environment variables and attacks -- Shellshock attack -- Buffer overflow attack -- Return-to-libc attack -- Format string vulnerability -- Race condition vulnerability -- Dirty COW -- Reverse shell -- Pt. 2: Web security -- Cross-site request forgery -- Cross-site scripting attack -- SQL injection attack -- Pt. 3: Hardware security -- Meltdown attack -- Spectre attack -- Pt. 4: Network security -- Packet sniffing and spoofing -- Attacks on the TCP protocol -- Firewall -- Domain name system (DNS) and attacks -- Virtual private network -- The heartbleed bug and attack -- Pt. 5: Cryptography -- Secret-key encryption -- One-way hash function -- Public key cryptography -- Public key infrastructure -- Transport layer security -- Bitcoin and blockchain.