30,99 €
versandkostenfrei*

inkl. MwSt.
Sofort lieferbar
15 °P sammeln

    Broschiertes Buch

James Forshaw, Microsoft's #1 bug hunter in 2015, teaches readers how to find, exploit, and ultimately protect vulnerabilities in network protocols. Attacking Network Protocols offers security professionals and developers a deeper understanding of network protocols, to allow them to better understand networks, protect them against attack, and find new vulnerabilities.…mehr

Produktbeschreibung
James Forshaw, Microsoft's #1 bug hunter in 2015, teaches readers how to find, exploit, and ultimately protect vulnerabilities in network protocols. Attacking Network Protocols offers security professionals and developers a deeper understanding of network protocols, to allow them to better understand networks, protect them against attack, and find new vulnerabilities.
  • Produktdetails
  • Verlag: No Starch Press
  • Seitenzahl: 336
  • Erscheinungstermin: 26. Dezember 2017
  • Englisch
  • Abmessung: 233mm x 177mm x 27mm
  • Gewicht: 634g
  • ISBN-13: 9781593277505
  • ISBN-10: 1593277504
  • Artikelnr.: 46605988
Autorenporträt
James Forshaw is a renowned computer security researcher at Google Project Zero and the creator of the network protocol analysis tool Canape. His discovery of complex design issues in Microsoft Windows earned him the top bug bounty of $100,000 and placed him as the #1 researcher on the published list from Microsoft Security Response Center (MSRC). He's been invited to present his novel security research at global security conferences such as BlackHat, CanSecWest, and Chaos Computer Congress.
Inhaltsangabe
Introduction

Chapter 1: The Basics of Networking
Chapter 2: Capturing Application Traffic
Chapter 3: Network Protocol Structures
Chapter 4: Developing an Analysis Framework
Chapter 5: Advanced Traffic Capture
Chapter 6: Analysis from the Wire
Chapter 7: Application Reverse Engineering
Chapter 8: Network Protocol Security
Chapter 9: Implementing the Protocol
Chapter 10: Root Causes of Vulnerabilities
Chapter 11: Fuzzing, Debugging, and Exploit Development

Appendix: Binary Protocol Exploiter's Toolkit