Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 3: Hacking Using GPRS Uncovered
Table 3.1: Approximate format of the information stored in NAM
Table 3.2: Main types of memory chips used by manufacturers of cellular phones
Chapter 6: Specifiers Under Control
Table 6.1: Main functions for formatted input and output with brief descriptions
Chapter 8: Searching for Overflowing Buffers
Table 8.1: Potentially dangerous functions of the standard C library
Chapter 11: The Technique of Writing Portable Shellcode
Table 11.1: Different methods of searching for addresses of API functions
Chapter 16: Life Cycle of a Worm
Table 16.1: Top ten network worms
Chapter 18: Viruses in Scripts
Table 18.1: Typical indications of virus presence
Chapter 28: Databases Under Attack
Table 28.1: Main SQL commands
Table 28.2: Ports tracked by different database servers
Previous page
Table of content
Next page
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Object Types, Predicates, and Basic Constraints
Mapping ORM Models to Logical Database Models
Reverse Engineering and Importing to ORM
Creating a Basic Logical Database Model
Generating a Physical Database Schema
Interprocess Communications in Linux: The Nooks and Crannies
System Calls
Process Memory
Transforming a Local Function Call into a Remote Procedure
Introduction
D.1. Introduction
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Mergers and acquisitions
Cultural change
IT-based process change
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Basic ImageReady Animation, Tweening, and Layer Styles
Cause and Effect
Rotoscoping Techniques with Photoshop
Matte and Keying Plug-ins
Static Matte Painting in Photoshop
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Project Initiation
Answers and Explanations
Answers and Explanations
Appendix A. CD Contents and Installation Instructions
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Indirect Privilege Escalation
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies