000 01724 a2200241 4500
999 _c37733
_d37733
001 nam a22 7a 4500
020 _a9781733003933
020 _a9781548367947
082 _a005.8 DU CO
100 _aDu, Wenliang
_935711
245 _aComputer & Internet security :
_ba hands-on approach
_cWenliang Du
250 _a2nd ed.
260 _a[Place of publication not identified] :
_b{Publisher not identified],
_cc2019.
300 _aXXX, 657 p. :
_bill. ;
_c24 cm.
500 _aIncludes bibliographical references (pages 409-418) and index.
505 _aPt. 1: Software security -- Set-UID programs -- Environment variables and attacks -- Shellshock attack -- Buffer overflow attack -- Return-to-libc attack -- Format string vulnerability -- Race condition vulnerability -- Dirty COW -- Reverse shell -- Pt. 2: Web security -- Cross-site request forgery -- Cross-site scripting attack -- SQL injection attack -- Pt. 3: Hardware security -- Meltdown attack -- Spectre attack -- Pt. 4: Network security -- Packet sniffing and spoofing -- Attacks on the TCP protocol -- Firewall -- Domain name system (DNS) and attacks -- Virtual private network -- The heartbleed bug and attack -- Pt. 5: Cryptography -- Secret-key encryption -- One-way hash function -- Public key cryptography -- Public key infrastructure -- Transport layer security -- Bitcoin and blockchain.
526 _aCSCI262
650 _aComputer security
_9641
650 _aInternet
_xSecurity measures
_927686
650 _aComputer networks
_xSecurity measures
_92602
856 _uhttps://elibrary.gemzplatform.com/computer-internet-security/?autologin_code=ZjAAct0WkseNSxQp3RiZuCsY9MIdobY9
_zeBook
942 _cONORDER