Narrow your search

Library

KU Leuven (3)

LUCA School of Arts (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

Vlerick Business School (3)

VIVES (3)

VUB (3)

UGent (2)

More...

Resource type

book (3)

digital (1)


Language

English (3)


Year
From To Submit

2008 (1)

2005 (1)

2004 (1)

Listing 1 - 3 of 3
Sort by
Hardware hacking : have fun while voiding your warranty
Authors: ---
ISBN: 9780080478258 0080478255 9781932266832 1932266836 1281056332 9781281056337 9786611056339 6611056335 Year: 2004 Publisher: Rockland, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'

Sockets, shellcode, porting & coding
Authors: --- ---
ISBN: 1281020273 9786611020279 0080489729 1597490334 1597490059 9781597490054 9781597490337 9780080489728 9781281020277 6611020276 Year: 2005 Publisher: Rockland, MA [Sebastopol, CA] Syngress Pub. Distributed by O'Reilly Media in the United States and Canada

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and

Reverse engineering code with IDA Pro
Authors: ---
ISBN: 1281273333 9786611273330 0080558798 159749237X 9780080558790 9781597492379 Year: 2008 Publisher: Burlington, Mass. : Syngress Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code.*Reverse Engineer REA

Listing 1 - 3 of 3
Sort by