Publicado 2023
Tabla de Contenidos:
“…SQL Injection Example -- Surprising Output -- Overly Powerful Input -- Denial-of-Service Threats to Parsers -- Bad Advice -- Chained Parsers -- Specific Parsing Scenario Threats -- Parsing Protocols + Document Formats -- C Code + Memory Safety -- Defenses -- The Robustness Principle -- Input Validation -- Memory Safety -- LangSec -- Conclusion -- Chapter 9 Kill Chains -- Threats: Kill Chains -- Server Kill Chain -- Desktop Kill Chains -- Acquire or Use Credentials -- Kill Chains for Specific Scenarios -- Cloud -- IoT -- Mobile (IoS, Android) -- Weaponization as a Subchain -- "No One Would Ever Do That" -- Ransomware -- Elements of Network Kill Chains -- History -- History of Kill Chains -- Defenses -- Types of Defenses -- Defensive Scenarios -- Conclusion -- Epilogue -- Glossary -- Bibliography -- Story Index --
Episode I: The Phantom Menace --
Episode III: Revenge of the Sith -- Obi-Wan (Television Series) -- Rogue One --
Star Wars: A New Hope -- The
Empire Strikes Back -- Return of the Jedi -- Index -- EULA…”
Número de Clasificación:
Cargando…
Ubicado:
Cargando…
Libro electrónico
Cargando…