Surveillance Technologies And Early Warning Systems: Data Mining Applications For Risk Detection (Premier Reference Source) A Guide To Kernel Exploitation Attacking The Core
Guide%20to%20Kernel%20Exploitation
A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core
Guide%20to%20Kernel%20Exploitation
A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core
A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core
User Manual: Pdf
Open the PDF directly: View PDF
Page Count: 465 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- A Guide to Kernel Exploitation
- Copyright
- Table of Contents
- Foreword
- Preface
- Acknowledgments
- About the Authors
- About the Technical Editor
- Part I. Journey to Kernel Land
- Part II. The UNIX Family, Mac OS X, and Windows
- Part III. Remote Kernel Exploitation
- Part IV. Final Words
- Index