Mostrando 2,521 - 2,540 Resultados de 26,749 Para Buscar '"Tool"', tiempo de consulta: 0.09s Limitar resultados
  1. 2521
    por Sugarman, Joseph, 1938-
    Publicado 1999
    Libro
  2. 2522
  3. 2523
  4. 2524
    Publicado 2020
    Materias:
    Libro electrónico
  5. 2525
  6. 2526
  7. 2527
    por Kolodziej, Joanna
    Publicado 2014
    “…Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java platform : Virtual machines, Languages, and Tools…”
    Libro electrónico
  8. 2528
    Publicado 2014
    “…Proceedings of the 6th International Workshop on Equation-Based Object-Oriented Modeling Languages and Tools…”
    Libro electrónico
  9. 2529
    por Das, Manuvir
    Publicado 2007
    “…Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering…”
    Libro electrónico
  10. 2530
    por Bajracharya, Sushil
    Publicado 2011
    “…Search-Driven Development: Users, Infrastructure, Tools, and Evaluation'11…”
    Libro electrónico
  11. 2531
    por Plümicke, Martin
    Publicado 2013
    “…Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform : Virtual Machines, Languages, and Tools…”
    Libro electrónico
  12. 2532
    Publicado 2021
    Materias:
    Libro electrónico
  13. 2533
  14. 2534
    Publicado 2020
    Materias: “…dynamic and interactive tool…”
    Libro electrónico
  15. 2535
    por Orpí, Daniel
    Publicado 1994
    Materias:
    Libro
  16. 2536
    Publicado 2020
    “…Getting clean data to reveal insights is essential, as directly jumping into data analysis without proper data cleaning may lead to incorrect results. This book shows you tools and techniques that you can apply to clean and handle data with Python. …”
    Otros
  17. 2537
  18. 2538
  19. 2539
    Publicado 2018
    Tabla de Contenidos: “…Code injection fundamentals - fine-tuning with BDF -- Trojan engineering with BDF and IDA -- Summary -- Questions -- Further reading -- Chapter 11: Bypassing Protections with ROP -- Technical requirements -- DEP and ASLR - the intentional and the unavoidable -- Understanding DEP -- Understanding ASLR -- Testing DEP protection with WinDbg -- Demonstrating ASLR on Kali Linux with C -- Introducing return-oriented programming -- Borrowing chunks and returning to libc - turning the code against itself -- The basic unit of ROP - gadgets -- Getting cozy with our tools - MSFrop and ROPgadget -- Metasploit Framework's ROP tool - MSFrop -- Your sophisticated ROP lab - ROPgadget -- Creating our vulnerable C program without disabling protections -- No PIE for you - compiling your vulnerable executable without ASLR hardening -- Generating a ROP chain -- Getting hands-on with the return-to-PLT attack -- Extracting gadget information for building your payload -- Finding the .bss address -- Finding a pop pop ret structure -- Finding addresses for system@plt and strcpy@plt functions -- Finding target characters in memory with ROPgadget and Python -- Go, go, gadget ROP chain - bringing it together for the exploit -- Finding the offset to return with gdb -- Writing the Python exploit -- Summary -- Questions -- Further reading -- Chapter 12: Fuzzing Techniques -- Technical requirements -- Network fuzzing - mutation fuzzing with Taof proxying -- Configuring the Taof proxy to target the remote service -- Fuzzing by proxy - generating legitimate traffic -- Hands-on fuzzing with Kali and Python -- Picking up where Taof left off with Python - fuzzing the vulnerable FTP server -- The other side - fuzzing a vulnerable FTP client -- Writing a bare-bones FTP fuzzer service in Python -- Crashing the target with the Python fuzzer -- Fuzzy registers - the low-level perspective…”
    Libro electrónico
  20. 2540
    Publicado 2017
    Tabla de Contenidos: “…-- Digital forensics methodology -- A brief history of digital forensics -- The need for digital forensics as technology advances -- Commercial tools available in the field of digital forensics -- Operating systems and open source tools for digital forensics -- Digital evidence and forensics toolkit Linux -- Computer Aided INvestigative Environment -- Kali Linux -- The need for multiple forensics tools in digital investigations -- Anti-forensics: threats to digital forensics -- Encryption -- Online and offline anonymity -- Summary -- Chapter 2: Installing Kali Linux -- Software version -- Downloading Kali Linux -- Installing Kali Linux -- Installing Kali Linux in VirtualBox -- Preparing the Kali Linux virtual machine -- Installing Kali Linux on the virtual machine -- Partitioning the disk -- Exploring Kali Linux -- Summary -- Chapter 3: Understanding Filesystems and Storage Media -- Storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Evolution of the floppy disk -- Optical storage media -- Compact disks -- Digital versatile disks -- Blu-ray disk -- Flash storage media -- USB flash drives -- Flash memory cards -- Hard disk drives -- IDE HDDs -- SATA HDDs -- Solid-state drives -- Filesystems and operating systems -- What about the data? …”
    Libro electrónico