This book provides the reader a dynamic educational experience focused on stack based binary exploits. It provides a guide for educators in developing course syllabi and coursework for students. The goal of this book can further the education of important security topics of binary exploits focused on the execution stack of a program. The book will feature rich text descriptions paired with end-of-chapter exercises and comprehensive live examples with a ready-made Virtual Machine image that can be used directly for instruction. Readers will also develop new skills in how to analyze programs for such vulnerabilities, and how to exploit programs to executie arbitrary code.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.