Hacking: The Art of Exploitation
GPTKB entity
Statements (35)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:book
|
| gptkbp:author |
gptkb:Jon_Erickson
|
| gptkbp:country |
gptkb:United_States
|
| gptkbp:edition |
Second edition
First edition |
| gptkbp:format |
digital
paperback |
| gptkbp:genre |
non-fiction
|
| gptkbp:ISBN |
978-1-59327-144-2
|
| gptkbp:language |
English
|
| gptkbp:mediaType |
gptkb:book
gptkb:print |
| gptkbp:notableFor |
includes CD with Linux environment
practical approach to hacking |
| gptkbp:pages |
488
|
| gptkbp:publicationDate |
2003
2008 |
| gptkbp:publisher |
gptkb:No_Starch_Press
|
| gptkbp:subject |
computer security
hacking exploitation |
| gptkbp:targetAudience |
security professionals
programmers hackers |
| gptkbp:teaches |
gptkb:C_programming
cryptography buffer overflows memory management network attacks exploits reverse engineering shellcode |
| gptkbp:bfsParent |
gptkb:No_Starch_Press
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Hacking: The Art of Exploitation
|