A bug hunter's diary: a guided tour through the wilds of software security
Although ominous-sounding terms like "zero-day" and "exploit" are widely used, even many security professionals don't know how bug hunters actually find and attack software security flaws. In A Bug Hunter's Diary, readers follow along with security expert Tobias Klein a...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco
No Starch Press
2011
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781593273859/?ar |
Zusammenfassung: | Although ominous-sounding terms like "zero-day" and "exploit" are widely used, even many security professionals don't know how bug hunters actually find and attack software security flaws. In A Bug Hunter's Diary, readers follow along with security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems. Readers |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (px, 194 Seiten) illustrations |
ISBN: | 9781593274153 1593274157 9781593273859 1593273851 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047646845 | ||
003 | DE-627-1 | ||
005 | 20240228114924.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2011 xx |||||o 00| ||eng c | ||
020 | |a 9781593274153 |c electronic bk. |9 978-1-59327-415-3 | ||
020 | |a 1593274157 |c electronic bk. |9 1-59327-415-7 | ||
020 | |a 9781593273859 |c electronic bk. |9 978-1-59327-385-9 | ||
020 | |a 1593273851 |c electronic bk. |9 1-59327-385-1 | ||
035 | |a (DE-627-1)047646845 | ||
035 | |a (DE-599)KEP047646845 | ||
035 | |a (ORHE)9781593273859 | ||
035 | |a (DE-627-1)047646845 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Klein, Tobias |e VerfasserIn |4 aut | |
240 | 1 | 0 | |a Aus dem Tagebuch eines Bughunters |
245 | 1 | 2 | |a A bug hunter's diary |b a guided tour through the wilds of software security |c by Tobias Klein |
264 | 1 | |a San Francisco |b No Starch Press |c 2011 | |
300 | |a 1 Online-Ressource (px, 194 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Although ominous-sounding terms like "zero-day" and "exploit" are widely used, even many security professionals don't know how bug hunters actually find and attack software security flaws. In A Bug Hunter's Diary, readers follow along with security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems. Readers | ||
650 | 0 | |a Debugging in computer science | |
650 | 0 | |a Computer security | |
650 | 0 | |a Malware (Computer software) | |
650 | 4 | |a Débogage | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Debugging in computer science | |
650 | 4 | |a Malware (Computer software) | |
776 | 1 | |z 9781593273859 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781593273859 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781593273859/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047646845 |
---|---|
_version_ | 1821494867695501313 |
adam_text | |
any_adam_object | |
author | Klein, Tobias |
author_facet | Klein, Tobias |
author_role | aut |
author_sort | Klein, Tobias |
author_variant | t k tk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047646845 (DE-599)KEP047646845 (ORHE)9781593273859 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02685cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047646845</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114924.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593274153</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59327-415-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593274157</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59327-415-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593273859</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59327-385-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593273851</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59327-385-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047646845</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047646845</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781593273859</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047646845</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Klein, Tobias</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Aus dem Tagebuch eines Bughunters</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A bug hunter's diary</subfield><subfield code="b">a guided tour through the wilds of software security</subfield><subfield code="c">by Tobias Klein</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (px, 194 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Although ominous-sounding terms like "zero-day" and "exploit" are widely used, even many security professionals don't know how bug hunters actually find and attack software security flaws. In A Bug Hunter's Diary, readers follow along with security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems. Readers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Debugging in computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Débogage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Debugging in computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781593273859</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781593273859</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781593273859/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047646845 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781593274153 1593274157 9781593273859 1593273851 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (px, 194 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | No Starch Press |
record_format | marc |
spelling | Klein, Tobias VerfasserIn aut Aus dem Tagebuch eines Bughunters A bug hunter's diary a guided tour through the wilds of software security by Tobias Klein San Francisco No Starch Press 2011 1 Online-Ressource (px, 194 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Although ominous-sounding terms like "zero-day" and "exploit" are widely used, even many security professionals don't know how bug hunters actually find and attack software security flaws. In A Bug Hunter's Diary, readers follow along with security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems. Readers Debugging in computer science Computer security Malware (Computer software) Débogage Sécurité informatique Logiciels malveillants COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General 9781593273859 Erscheint auch als Druck-Ausgabe 9781593273859 |
spellingShingle | Klein, Tobias A bug hunter's diary a guided tour through the wilds of software security Debugging in computer science Computer security Malware (Computer software) Débogage Sécurité informatique Logiciels malveillants COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
title | A bug hunter's diary a guided tour through the wilds of software security |
title_alt | Aus dem Tagebuch eines Bughunters |
title_auth | A bug hunter's diary a guided tour through the wilds of software security |
title_exact_search | A bug hunter's diary a guided tour through the wilds of software security |
title_full | A bug hunter's diary a guided tour through the wilds of software security by Tobias Klein |
title_fullStr | A bug hunter's diary a guided tour through the wilds of software security by Tobias Klein |
title_full_unstemmed | A bug hunter's diary a guided tour through the wilds of software security by Tobias Klein |
title_short | A bug hunter's diary |
title_sort | bug hunter s diary a guided tour through the wilds of software security |
title_sub | a guided tour through the wilds of software security |
topic | Debugging in computer science Computer security Malware (Computer software) Débogage Sécurité informatique Logiciels malveillants COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
topic_facet | Debugging in computer science Computer security Malware (Computer software) Débogage Sécurité informatique Logiciels malveillants COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
work_keys_str_mv | AT kleintobias ausdemtagebucheinesbughunters AT kleintobias abughuntersdiaryaguidedtourthroughthewildsofsoftwaresecurity AT kleintobias bughuntersdiaryaguidedtourthroughthewildsofsoftwaresecurity |