twitter Harry Potter House Eds before the fall lyrebird eligible curtis sittenfeld
Search our site
The Music Shop by Rachel Joyce Read the opening extract of the brand new Rachel Joyce book before its publication on 13/07/2017

Sockets, Shellcode, Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster
  

Sockets, Shellcode, Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals

RRP £33.99

Notify me
when in stock

As soon as this book is back in stock we will send you an email.

Synopsis

Sockets, Shellcode, Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel. 5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.

About the Author

James C. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Preceding CSC, Foster was the Director of Research and Development for Foundstone Inc. and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. and an adjunct author at Information Security Magazine, subsequent to working as Security Research Specialist for the Department of Defense. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress, ISBN: 1-931836-04-3), Hacking Exposed, Fourth Edition, Anti-Hacker Toolkit, Second Edition, Advanced Intrusion Detection, Hacking the Code: ASP.NET Web Application Security (Syngress, ISBN: 1-932266-65-8), Anti-Spam Toolkit, Google Hacking for Penetration Techniques (Syngress, ISBN: 1-931836-36-1), and Sockets, Shellcode, Porting and Coding (Syngress ISBN: 1-597490-05-9).

More books by this author
Author 'Like for Like' recommendations

Loading other formats...

Book Info

Publication date

26th April 2005

Author

James C. Foster

More books by James C. Foster
Author 'Like for Like'
    recommendations

Publisher

Syngress Media,U.S.

Format

Paperback
700 pages

Categories

Network security
Data encryption
Electronics engineering

ISBN

9781597490054

It gives a chance to read about new titles, invites comments from all kinds of readers and is run by such a nice bunch of book lovers.

Joy Bosworth

I love that Lovereading handpicks very special debut reads.

Magda North

Hooked on books? Give Lovereading a go - for the chance to discover brilliant books, and to see why our members love it so.

Claire Hill

Lovereading is pitched at just the right level for all the various types of people who enjoy reading in its many forms.

Pam Woodburn

It's the first site that I visit when deciding on the next set of books to buy. A particular treat is being able to download an extract.

Tessa Olson

Lovereading is a wonderful way to expand my literary horizons, discover inspiring authors & get the chance to read new novels first. #loveit

Zarina de Ruiter

Lovereading has given me the opportunity to delve into new and exciting worlds of authors who I would never have tried before.

Glynis Elliott

Insightful reader reviews and unbiased recommendations. I don't know how I chose books before Lovereading! An essential for all book lovers.

Sarah Harper

Lovereading4kids

Lovereading4schools