likeyoulove make the most of Lovereading books of the month
Search our site
The Course of History Ten Meals That Changed the World by Struan Stevenson, Tony Singh Read the opening extract of the brand new Struan Stevenson, Tony Singh book before its publication on 24/10/2017

Sockets, Shellcode, Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster
  

Sockets, Shellcode, Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals

RRP £33.99

Notify me
when in stock

As soon as this book is back in stock we will send you an email.

Synopsis

Sockets, Shellcode, Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel. 5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.

About the Author

James C. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Preceding CSC, Foster was the Director of Research and Development for Foundstone Inc. and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. and an adjunct author at Information Security Magazine, subsequent to working as Security Research Specialist for the Department of Defense. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress, ISBN: 1-931836-04-3), Hacking Exposed, Fourth Edition, Anti-Hacker Toolkit, Second Edition, Advanced Intrusion Detection, Hacking the Code: ASP.NET Web Application Security (Syngress, ISBN: 1-932266-65-8), Anti-Spam Toolkit, Google Hacking for Penetration Techniques (Syngress, ISBN: 1-931836-36-1), and Sockets, Shellcode, Porting and Coding (Syngress ISBN: 1-597490-05-9).

More books by this author
Author 'Like for Like' recommendations

Loading other formats...

Book Info

Publication date

26th April 2005

Author

James C. Foster

More books by James C. Foster
Author 'Like for Like'
    recommendations

Publisher

Syngress Media,U.S.

Format

Paperback
700 pages

Categories

Network security
Data encryption
Electronics engineering

ISBN

9781597490054

Love Reading - it not only does what it says on the tin, it does it with Jam on!!

Maz Tucker

Lovereading helps me decide what real people read.

Kerry Bridges

I recommend Lovereading because you get honest reviews on a whole range of genres-there's something for everyone. It's the only site I need.

Sian Spinney

Lovereading has all the new books and also suggestions for 'similar' authors whilst waiting for your favourites new books.

Carol Peace

If you LOVE reading then you will love LOVEREADING! It's a 'novel' idea. Seriously though I could not recommend them enough.

Rebecca Whymark

What can I say, the clue is in the title Lovereading - and awesome books.

Sarah Davis

The best new books on the market, reviewed honestly, to give your readers the best choices.

Julie Cook

It has enriched my leisure time by introducing me to a world of books which I would not have previously considered.

Val Rowe

Lovereading4kids

Lovereading4schools