Fenster schließen
Was suchen Sie? (Suchworte, EAN-Nr.)  Such-Tipps

Produktvorschläge:
Ich schwebe über Krakau: Erinnerungsbilder
Ich schwebe über Krakau: Erinnerungsbilder
Binding : Gebundene Ausgabe, Edition : 3, Label : Carl Hanser, Publisher : Carl Hanser, medium : Gebundene Ausgabe, numberOfPages : 288, publicationDate : 2000-08-21, authors : Adam Zagajewski, translators : Henryk Bereska, languages[...]
EAN 9783446199231
Hersteller: Adam Zagajewski
Bester Preis:
8,99€ (+1.99)
von: Medimops (gebrauchtes)
Alle Preise
Vom Kopf ins Herz
Vom Kopf ins Herz
Binding : Gebundene Ausgabe, Edition : Nachdruck., Label : Menani, Publisher : Menani, medium : Gebundene Ausgabe, numberOfPages : 168, publicationDate : 2002-01-01, authors : Bühler, Franz X., languages : german, ISBN : 3941633104
EAN 9783941633100
Hersteller: Bühler, Franz X.
Bester Preis:
5,99€ (+1.99)
von: Medimops (gebrauchtes)
Alle Preise
Die Kunst, ein kreatives Leben zu führen: oder Anregung zu Achtsamkeit
Die Kunst, ein kreatives Leben zu führen: oder Anregung zu Achtsamkeit
Binding : Broschiert, Edition : 1, Label : Schmidt (Hermann), Mainz, Publisher : Schmidt (Hermann), Mainz, medium : Broschiert, numberOfPages : 192, publicationDate[...]
EAN 9783874398299
Hersteller: Frank Berzbach
Bester Preis:
20,49€
von: Medimops (gebrauchtes)
Alle Preise
-9%
Twain, Mark: Ich bin der eselhafteste Mensch, den ich je gekannt habe 1+2
Twain, Mark: Ich bin der eselhafteste Mensch, den ich je gekannt habe 1+2
Sie denken, Sie kennen Mark Twain? Weit gefehlt! Twain in Höchstform: Amerikas größter Humorist offenbart uns ungekannte Geheimnisse und Abenteuer seiner[...]
EAN 9783351033330
Bester Preis:
19,95€
von: Averdo
Mit geistig Behinderten leben und arbeiten: Eine entwicklungspsychologische Einführung
Mit geistig Behinderten leben und arbeiten: Eine entwicklungspsychologische Einführung
Binding : Taschenbuch, Edition : 10, Label : C.H.Beck, Publisher : C.H.Beck, medium : Taschenbuch, numberOfPages : 412, publicationDate : 2015-08-19, authors[...]
EAN 9783406684999
Hersteller: Barbara Senckel
Bester Preis:
17,99€ (+1.99)
von: Medimops (gebrauchtes)
Alle Preise
Praxisbuch Trauergruppen - Grundlagen und kreative Methoden für Erwachsene, Jugendliche und Kinder
Praxisbuch Trauergruppen - Grundlagen und kreative Methoden für Erwachsene, Jugendliche und Kinder
Binding : Broschiert, Label : Patmos Verlag, Publisher : Patmos Verlag, medium : Broschiert, numberOfPages : 176, publicationDate :[...]
EAN 9783843606745
Hersteller: Schroeter-Rupieper
Bester Preis:
18,00€ (+1.99)
von: Medimops (gebrauchtes)
Alle Preise

Erickson, Jon: Hacking

Hersteller: No Starch Press,US / EAN-Nummer: 9781593271442


TOP PREIS!
Erickson, Jon: Hacking

Anbieter: Averdo

Erickson, Jon: Hacking
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: - Program computers using C, assembly language, and shell scripts - Corrupt system memory to run arbitrary code using buffer overflows and format strings - Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening - Outsmart common security measures like nonexecutable stacks and intrusion detection systems - Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence - Redirect network traffic, conceal open ports, and hijack TCP connections - Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition [...]

Anbieter-Kategorie: Fachbücher, Lernen & Nachschlagen

Preis: 38,21 Euro (+ Versandkosten 0,00 Euro)

ID: 23231954178

Hacking

Anbieter: Thalia-Fremdsprachen

Hacking
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment - all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: - Program computers using C, assembly language, and shell scripts - Corrupt system memory to run arbitrary code using buffer overflows and format strings - Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening - Outsmart common security measures like non-executable stacks and intrusion detection systems - Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence - Redirect network traffic, conceal open ports, and hijack TCP connections - Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unkown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition w [...]

Anbieter-Kategorie: Fremdsprachige Bücher

Preis: 45,99 Euro (+ Versandkosten 0,00 Euro)

ID: 20236782183

Hacking

Anbieter: Thalia Bücher Medien

Hacking
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment - all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: - Program computers using C, assembly language, and shell scripts - Corrupt system memory to run arbitrary code using buffer overflows and format strings - Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening - Outsmart common security measures like non-executable stacks and intrusion detection systems - Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence - Redirect network traffic, conceal open ports, and hijack TCP connections - Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unkown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition w [...]

Anbieter-Kategorie: Fremdsprachige Bücher

Preis: 45,99 Euro (+ Versandkosten 0,00 Euro)

ID: 24183957126

Schlagworte der gewählten Anbieter-Kategorien:
the, in, bücher, vol, books, us, house, and, penguin, publishing, random, ltd, llc, book, group, uk, of, harpercollins, to, simon, usa, schuster, for, little, vermilion, macmillan, fremdsprachige, press, collins, harper, publ, brown, fachbücher, nachschlagen, den, lernen, und, der, die, für, das, mit, im, von, des, klasse, michael, als, thomas, peter, leben, zum, deutsch, hans, handbuch, ich, dummies, andreas, zur, christian, edition