A Guide to Kernel Exploitation Attacking the Core
When I was originally asked to write a Foreword for this book, I refused because I didn’t want to show up in the light dedicated to others whose hard work resulted in the book you hold in your hands. However, after proofreading some of the book’s chapters I realized that it would be sad to miss the opportunity, and that it is a great honor to write a few words in a book authored by two of the world’s best kernel exploit developers. I rarely read books about exploitation techniques because they usually provide little or outdated knowledge or simply enumerate exploits done by others. Additionally, books cannot provide the learning effect of hands-on exploit development or the fun of a ‘#’ prompt after days of hard work, especially if a kernel vulnerability is exploited. It’s about time that someone transformed this feeling into paper with the benefit of saving other developers time, a lot of crashes, and headaches.
جهت استعلام قیمت و سفارش چاپ این محصول لطفا با انتشارات گنج حضور تماس حاصل فرمایید
انتشارات گنج حضور
ارایه خدمات تخصصی چاپ کتاب و دیجیتال
تلفن: 33360361 – 041
تبریز/خیابان امام/فلکه دانشگاه/مجتمع تجاری نسیم