Exploiting Software: How to Break Code -- Chapter 7, Buffer Overflow

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems and antivirus software not keeping out the bad guys? This book provides the answers. In particular, this free excerpt takes a look at buffer overflow attacks and the harm they can inflict.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close