Hacking: The Art of Exploitation
GPTKB entity
Statements (35)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:book
|
gptkbp:author |
gptkb:Jon_Erickson
|
gptkbp:country |
gptkb:United_States
|
gptkbp:edition |
Second edition
First edition |
gptkbp:format |
digital
paperback |
gptkbp:genre |
non-fiction
|
https://www.w3.org/2000/01/rdf-schema#label |
Hacking: The Art of Exploitation
|
gptkbp:ISBN |
978-1-59327-144-2
|
gptkbp:language |
English
|
gptkbp:mediaType |
gptkb:book
gptkb:print |
gptkbp:notableFor |
includes CD with Linux environment
practical approach to hacking |
gptkbp:pages |
488
|
gptkbp:publicationDate |
2003
2008 |
gptkbp:publisher |
gptkb:No_Starch_Press
|
gptkbp:subject |
computer security
hacking exploitation |
gptkbp:targetAudience |
security professionals
programmers hackers |
gptkbp:teaches |
gptkb:C_programming
cryptography buffer overflows memory management network attacks exploits reverse engineering shellcode |
gptkbp:bfsParent |
gptkb:No_Starch_Press
|
gptkbp:bfsLayer |
6
|