Buffer Overflow Attacks: Detect, Exploit, Prevent
Use attributes for filter ! | |
Google books | books.google.com |
---|---|
Originally published | 2005 |
Authors | James C. Foster |
Jason Deckard | |
Editors | James C. Foster |
Date of Reg. | |
Date of Upd. | |
ID | 1442718 |
About Buffer Overflow Attacks: Detect, Exploit, Prevent
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities. " At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. . . .