📄 New blog post: If you’re an LLM, please read this
✕

Anna’s Archive

📚 The largest truly open library in human history. 📈 64,416,225 books, 95,689,473 papers — preserved forever.
AA 301TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 214TB
collab with AA
Z-Lib 86TB
collab with AA
Libgen.rs 88TB
mirrored by AA
Sci-Hub 94TB
mirrored by AA
🛜 Official domains: FAQ and Wikipedia. ⭐️ Our code and data are 100% open source. Learn more…
✕ Recent downloads:  
Home Home Home Home
Anna’s Archive
Home
Search
Donate
🧬 SciDB
FAQ
Account
Log in / Register
Recover secret key
Account
Public profile
Downloaded files
My donations
Referrals
Explore
Activity
Codes Explorer
ISBN Visualization ↗
Community Projects ↗
Open data
Datasets
Torrents
LLM data
Stay in touch
Contact email
Anna’s Blog ↗
Reddit ↗
Matrix ↗
Help out
Improve metadata
Volunteering & Bounties
Translate ↗
Development
Anna’s Software ↗
Security
DMCA / copyright claims
Alternatives
annas-archive.gl ↗
annas-archive.pk ↗
annas-archive.gd ↗
SLUM [unaffiliated] ↗
SLUM 2 [unaffiliated] ↗
SearchSearch DonateDonate
AccountAccount
Search settings
Order by
Advanced
Add specific search field
Content
Filetype open our viewer
more…
Access
Source
Language
more…
Display
Search settings
Download Journal articles Digital Lending Metadata
Results 1-38 (38 total)
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition (2007, ).azw3
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · AZW3 · 2.9MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 167432.48
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition (2007, ).fb2
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · FB2 · 4.0MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 167432.36
upload/trantor/en/Erickson, Jon/Hacking the Art of Exploitation ú 2nd Edition.epub
Hacking the Art of Exploitation · 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2003
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, *Hacking: The Art of Exploitation, 2nd Edition* introduces the fundamentals of C programming from a hacker's perspective.The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, *Hacking: The Art of Exploitation, 2nd Edition* will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.words : 155425Auszeichnung : isbn searched
Read more…
English [en] · EPUB · 0.7MB · 2003 · 📗 Book (unknown) · 🚀/upload/zlib · Save
base score: 11063.0, final score: 167432.36
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition (2007, ).azw3
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · AZW3 · 2.9MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 167432.23
lgli/Jon Erickson [Erickson, Jon] - Hacking: The Art of Exploitation, 2nd Edition (2007, ).lit
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson [Erickson, Jon] No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · LIT · 2.4MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11053.0, final score: 167432.23
upload/bibliotik/H/Hacking_nodrm.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 6.8MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167431.94
upload/duxiu_main/v/zip/extracted__./英文书籍 (3.74G 全mobi格式).zip/Ó¢ÎÄÊé¼®/G-M/Jon Erickson/Jon Erickson/Hacking_ The Art of Exploitation, 2nd Ed (8105)/Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · MOBI · 1.1MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/upload/zlib · Save
base score: 11053.0, final score: 167431.47
upload/misc/qxL7POT2FrNLT4OPQeGE/Tech Anarchist/Hacking the art of exploitation.pdf
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 2.8MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/upload/zlib · Save
base score: 11068.0, final score: 167417.86
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition (2007, ).fb2
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · FB2 · 4.0MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 167417.77
nexusstc/Хакинг: искусство эксплойта/fe18a2862274e1e2746c8b9427a72521.pdf
Хакинг: искусство эксплойта: [16+] Джон Эриксон; [перевела с английского И. Рузмайкина] Символ-Плюс, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
Хакинг - это искусство творческого решения задач, подразумевающее нестандартный подход к сложным проблемам и использование уязвимостей программ. Часто бывает трудно разобраться в методах хакинга, потому что для этого нужны широкие и глубокие знания. Автор не учит применять известные эксплойты, а объясняет их работу и внутреннюю сущность. Вначале читатель знакомится с основами программирования на C, ассемблере и языке командной оболочки, учится исследовать регистры процессора. А усвоив материал, можно приступать к хагингу - перезаписывать память с помощью переполнения буфера, получать доступ к удаленному серверу, скрывая свое присутствие, и перехватывать соединения TCP. Изучив эти методы, можно взламывать зашифрованный трафик беспроводных сетей, успешно преодолевая системы защиты и обнаружения вторжений. Книга дает полное представление о программировании, машинной архитектуре, сетевых соединениях и хакерских приемах. С этими знаниями ваши возможности ограничены только воображением. Материалы для работы с этим изданием имеются в виде загрузочного диска Ubuntu Linux, который можно скачать и использовать, не затрагивая установленную на компьютере ОС. Об авторе Джон Эриксон занимается хакерством и программированием с пяти лет. Получил образование в области вычислительной техники. Он регулярный участник конференций и организатор обучающих семинаров по защите информационных систем по всему миру. В настоящее время работает в Северной Калифорнии специалистом по безопасности и занимается исследованием программных уязвимостей.
Read more…
English [en] · Russian [ru] · PDF · 2.2MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167417.77
lgli/L:\bib\Jon Erickson\Hacking_ The Art of Exploitation, 2nd Ed (21784)\Hacking_ The Art of Exploitation, 2nd Ed - Jon Erickson.mobi
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · MOBI · 1.5MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/zlib · Save
base score: 11055.0, final score: 167417.52
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition (2010, ).epub
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Includes a live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system.
Read more…
English [en] · EPUB · 1.4MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11065.0, final score: 167417.52
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition (2008, No Starch Press).epub
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · EPUB · 1.4MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11065.0, final score: 167417.5
nexusstc/Хакинг: искусство эксплойта/e6e8ef3b9d505ab5aaad5758ba83fff7.pdf
Хакинг: искусство эксплойта: [16+] Джон Эриксон; [перевела с английского И. Рузмайкина] Символ-Плюс, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
Хакинг - это искусство творческого решения задач, подразумевающее нестандартный подход к сложным проблемам и использование уязвимостей программ. Часто бывает трудно разобраться в методах хакинга, потому что для этого нужны широкие и глубокие знания. Автор не учит применять известные эксплойты, а объясняет их работу и внутреннюю сущность. Вначале читатель знакомится с основами программирования на C, ассемблере и языке командной оболочки, учится исследовать регистры процессора. А усвоив материал, можно приступать к хагингу - перезаписывать память с помощью переполнения буфера, получать доступ к удаленному серверу, скрывая свое присутствие, и перехватывать соединения TCP. Изучив эти методы, можно взламывать зашифрованный трафик беспроводных сетей, успешно преодолевая системы защиты и обнаружения вторжений. Книга дает полное представление о программировании, машинной архитектуре, сетевых соединениях и хакерских приемах. С этими знаниями ваши возможности ограничены только воображением. Материалы для работы с этим изданием имеются в виде загрузочного диска Ubuntu Linux, который можно скачать и использовать, не затрагивая установленную на компьютере ОС. Об авторе Джон Эриксон занимается хакерством и программированием с пяти лет. Получил образование в области вычислительной техники. Он регулярный участник конференций и организатор обучающих семинаров по защите информационных систем по всему миру. В настоящее время работает в Северной Калифорнии специалистом по безопасности и занимается исследованием программных уязвимостей.
Read more…
English [en] · Russian [ru] · PDF · 2.6MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167417.5
upload/duxiu_main/v/rar/非简体中文/ebooks3/Hacking_ The Art of Exploitatio - Jon Erickson.mobi
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Includes a live CD, which provides a Linux programming environment and all of its benefits without the hassle of installing a new operating system. COMPUTERS / Security / General
Read more…
English [en] · MOBI · 1.1MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/upload/zlib · Save
base score: 11050.0, final score: 167417.5
upload/misc/qxL7POT2FrNLT4OPQeGE/Tech Anarchist/Hacking The Art Of Exploitation 2nd Edition.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 6.7MB · 2010 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167417.44
lgli/Jon Erickson - Hacking: The Art of Exploitation, 2nd Edition.rtf
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · RTF · 3.7MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11053.0, final score: 167417.42
upload/bibliotik/H/Hacking_The_Art_of_Exploitation_Second_Edition.mobi
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, __Hacking: The Art of Exploitation, 2nd Edition__ introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: • Program computers using C, assembly language, and shell scripts • Corrupt system memory to run arbitrary code using buffer overflows and format strings • Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening • Outsmart common security measures like nonexecutable stacks and intrusion detection systems • Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence • Redirect network traffic, conceal open ports, and hijack TCP connections • Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, __Hacking: The Art of Exploitation, 2nd Edition__ will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
Read more…
English [en] · MOBI · 8.7MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11055.0, final score: 167417.3
lgli/R:\111\2664000/9621f36b1d43d3aaef37504267218039..pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 6.8MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167417.3
nexusstc/Hacking: The Art of Exploitation/d1b1001e22f358d090e0496d74914a39.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 4.6MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167417.28
upload/motw_shc_2025_10/shc/Hacking_ The Art of Exploitatio - Jon Erickson.epub
Hacking: The Art of Exploitation (2nd Edition) Jon Erickson, Jon Erickson No Starch Press, Incorporated, High tech, 2-е изд., Санкт-Петербург, Москва, Russia, 2010
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. ** Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. **
Read more…
English [en] · EPUB · 1.4MB · 2010 · 📘 Book (non-fiction) · 🚀/upload/zlib · Save
base score: 11068.0, final score: 167417.11
upload/misc/Y9EgLx762wKqWqG7nloH/Books/Gentoomen Library/Security/No Starch Press - Hacking The Art of Exploitation 2nd Edition.chm
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · CHM · 4.9MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11050.0, final score: 167417.03
upload/wll/ENTER/Fict-Bio/Jon Erickson - Hacking_ The Art of Exploitati_ion.epub
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · EPUB · 1.4MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167416.92
lgli/Z:\Bibliotik_\1\80.4.223.22\Hacking_ The Art of Exploitati - Jon Erickson_7157.mobi
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, US, 2 Aufl, 2007;2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · MOBI · 1.2MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11050.0, final score: 167416.92
upload/arabic/4_Uplod_11-12-2024/الباحث العلمي - Scientific Research (PDF) - Categorized Inside/Th - ث/Hacking-the-art-of-exploitation.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, US, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 4.2MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167416.9
lgli/Z:\Bibliotik_\7\99.17.230.60\Hacking_ The Art of Exploitati - Jon Erickson_3087.epub
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, US, 2 Aufl, 2007;2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · EPUB · 1.4MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167416.75
upload/bibliotik/H/Hacking - Jon Erickson.epub
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, US, 2 Aufl, 2007;2010
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · EPUB · 1.4MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167416.36
lgli/R:\!fiction\0day\eng\tor_lib2\Bitcoin for the Befuddled.epub
Bitcoin for the Befuddled Barski, Conrad; Wilmer, Chris No Starch Press, US : [distributor] John Wiley and Sons Ltd : [distributor] Woodslane Pty Ltd : [distributor] Woodslane Pty Ltd : [distributor] Intersoft Book Distributors (SIMRON Pty Ltd) : [distributor] Ingram Publisher Services, Penguin Random House LLC (Publisher Services), San Francisco, 2015
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · EPUB · 24.9MB · 2015 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/zlib · Save
base score: 11065.0, final score: 167414.64
upload/bibliotik/T/The IDA Pro Book - Chris Eagle.pdf
The IDA Pro Book Chris Eagle No Starch Press, Incorporated;Ingram Publisher Services [Distributor], Penguin Random House LLC (Publisher Services), San Francisco, Calif, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 9.4MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/upload/zlib · Save
base score: 11068.0, final score: 167414.52
upload/motw_shc_2025_10/shc/Hacking_ The Art of Exploitatio - Jon Erickson.pdf
Hacking : The Art of Exploitation (2nd Edition) Jon Erickson, Jon Erickson No Starch Press, Incorporated, Penguin Random House LLC (Publisher Services), San Francisco, Calif, 2008
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. ** Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. **
Read more…
English [en] · PDF · 8.9MB · 2008 · 📗 Book (unknown) · 🚀/upload · Save
base score: 10968.0, final score: 167368.64
upload/motw_shc_2025_10/shc/Hacking_ The Art of Exploitation - Jon Erickson.pdf
Hacking: The Art of Exploitation, 2nd Edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, Penguin Random House LLC (Publisher Services), San Francisco, Calif, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 2.9MB · 2008 · 📗 Book (unknown) · 🚀/upload · Save
base score: 10968.0, final score: 167353.84
lgli/Hacking - The Art of Exploitation, 2nd Edition.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 3.8MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs · Save
❌ This file might have issues.
base score: 0.01, final score: 150007.95
lgli/Hacking - The Art of Exploitation 2nd Edition - Jon Erickson - No Starch Press - 2008.pdf
Hacking: The Art of Exploitation, 2nd Edition Erickson, Jon, 1977- San Francisco, CA : No Starch Press, 2nd ed., San Francisco, CA, California, 2008
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. x, 472 p. : 23 cm. Includes bibliographical references and index.
Read more…
English [en] · PDF · 24.1MB · 2008 · 📘 Book (non-fiction) · 🚀/ia/lgli/lgrs/zlib · Save
❌ This file might have issues.
base score: 0.01, final score: 150007.77
lgli/I:/it-books_dl/6819/Hacking, 2nd Edition.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 5.1MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/zlib · Save
❌ This file might have issues.
base score: 0.01, final score: 150007.36
lgli/Jon Erickson;Hacking The Art of Exploitation;;;No Starch Press;2008;978-1593271442; 2nd Edition;English.pdf
Hacking : the art of exploitation, 2nd edition Jon Erickson, Jon Erickson No Starch Press, Incorporated, 2nd ed., San Francisco, CA, California, 2008
<p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> <p>Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.</p> <p>The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:</p> <ul> <li>Program computers using C, assembly language, and shell scripts</li> <li>Corrupt system memory to run arbitrary code using buffer overflows and format strings</li> <li>Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening</li> <li>Outsmart common security measures like nonexecutable stacks and intrusion detection systems</li> <li>Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence</li> <li>Redirect network traffic, conceal open ports, and hijack TCP connections</li> <li>Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix</li> </ul> <p> Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.</p> <p>This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. </p>
Read more…
English [en] · PDF · 13.1MB · 2008 · 📘 Book (non-fiction) · 🚀/lgli/lgrs · Save
❌ This file might have issues.
base score: 0.01, final score: 150007.3
lgli/_453655.a98e6704ce72da5cb46ef4ee9cbdae9a.pdf
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler, Second Edition by Chris Eagle No Starch Press, Incorporated;Ingram Publisher Services [Distributor], ITPro collection, 2nd ed, San Francisco, Calif, c2011
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage.Save time and effort as you learn to: Navigate, comment, and modify disassembly Identify known library routines, so you can focus your analysis on other areas of the code Use code graphing to quickly make sense of cross references and function calls Extend IDA to support new processors and filetypes using the SDK Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Use IDA's built-in debugger to tackle hostile and obfuscated code Whether you're analyzing malware, conducting vulnerability research, or reverse engineering software, a mastery of IDA is crucial to your success. Take your skills to the next level with this 2nd edition of The IDA Pro Book.
Read more…
English [en] · PDF · 9.7MB · 2011 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/zlib · Save
❌ This file might have issues.
base score: 0.01, final score: 150004.6
lgli/Джон Эриксон;Хакинг искусство эксплойта;;;Символ-Плюс;2010;;2-е;Russian.pdf
Хакинг: искусство эксплойта Джон Эриксон; [пер. с англ. С. Маккавеева] Символ-Плюс, High tech, 2, 2009
Хакинг - это искусство творческого решения задач, подразумевающее нестандартный подход к сложным проблемам и использование уязвимостей программ. Часто бывает трудно разобраться в методах хакинга, потому что для этого нужны широкие и глубокие знания. Автор не учит применять известные эксплойты, а объясняет их работу и внутреннюю сущность. Вначале читатель знакомится с основами программирования на C, ассемблере и языке командной оболочки, учится исследовать регистры процессора. А усвоив материал, можно приступать к хагингу - перезаписывать память с помощью переполнения буфера, получать доступ к удаленному серверу, скрывая свое присутствие, и перехватывать соединения TCP. Изучив эти методы, можно взламывать зашифрованный трафик беспроводных сетей, успешно преодолевая системы защиты и обнаружения вторжений. Книга дает полное представление о программировании, машинной архитектуре, сетевых соединениях и хакерских приемах. С этими знаниями ваши возможности ограничены только воображением. Материалы для работы с этим изданием имеются в виде загрузочного диска Ubuntu Linux, который можно скачать и использовать, не затрагивая установленную на компьютере ОС. Об авторе Джон Эриксон занимается хакерством и программированием с пяти лет. Получил образование в области вычислительной техники. Он регулярный участник конференций и организатор обучающих семинаров по защите информационных систем по всему миру. В настоящее время работает в Северной Калифорнии специалистом по безопасности и занимается исследованием программных уязвимостей.
Read more…
Russian [ru] · PDF · 11.9MB · 2009 · 📘 Book (non-fiction) · 🚀/lgli/lgrs · Save
❌ This file might have issues.
base score: 0.01, final score: 19.952547
lgli/Эриксон Джон;Хакинг - искусство эксплойта;High tech;;Символ-Плюс;2010;978-5-93286-158-5;2-е;Russian.pdf
Хакинг: искусство эксплойта Джон Эриксон; [пер. с англ. С. Маккавеева] Символ-Плюс, High tech, 2, 2009
Хакинг - это искусство творческого решения задач, подразумевающее нестандартный подход к сложным проблемам и использование уязвимостей программ. Часто бывает трудно разобраться в методах хакинга, потому что для этого нужны широкие и глубокие знания. Автор не учит применять известные эксплойты, а объясняет их работу и внутреннюю сущность. Вначале читатель знакомится с основами программирования на C, ассемблере и языке командной оболочки, учится исследовать регистры процессора. А усвоив материал, можно приступать к хагингу - перезаписывать память с помощью переполнения буфера, получать доступ к удаленному серверу, скрывая свое присутствие, и перехватывать соединения TCP. Изучив эти методы, можно взламывать зашифрованный трафик беспроводных сетей, успешно преодолевая системы защиты и обнаружения вторжений. Книга дает полное представление о программировании, машинной архитектуре, сетевых соединениях и хакерских приемах. С этими знаниями ваши возможности ограничены только воображением. Материалы для работы с этим изданием имеются в виде загрузочного диска Ubuntu Linux, который можно скачать и использовать, не затрагивая установленную на компьютере ОС. Об авторе Джон Эриксон занимается хакерством и программированием с пяти лет. Получил образование в области вычислительной техники. Он регулярный участник конференций и организатор обучающих семинаров по защите информационных систем по всему миру. В настоящее время работает в Северной Калифорнии специалистом по безопасности и занимается исследованием программных уязвимостей.
Read more…
Russian [ru] · PDF · 2.6MB · 2009 · 📘 Book (non-fiction) · 🚀/lgli/lgrs · Save
❌ This file might have issues.
base score: 0.01, final score: 19.444427
10 partial matches
zlib/no-category/Gajewska, Grażyna; Wójcik, Rafał/Kontekstowy Miks : przez opowieści graficzne do analiz kultury współczesnej_119212671.pdf
Kontekstowy Miks : przez opowieści graficzne do analiz kultury współczesnej Gajewska, Grażyna; Wójcik, Rafał Poznań : Wydawnictwo Poznańskiego Towarzystwa Przyjaciół Nauk, Prace Komisji Filologicznej -- t. 67, Prace Komisji Filologicznej -- t. 67., Poznań, Poland, 2011
426 p. : 25 cm, Includes bibliographical references
Read more…
Polish [pl] · PDF · 29.7MB · 2011 · 📗 Book (unknown) · 🚀/ia/zlib · Save
base score: 11063.0, final score: 29.30236
lgli/R:\!fiction\0day\_ENG\05-04-2013\M J O'Shea - [Little Magic 01] - A Little Bite of Magic [Loose Id MM] (mobi).mobi
A Little Bite of Magic O'Shea, M J Loose Id, LLC, Little Magic 1, 2013
In a family full of powerful witches, Frankie Vallerand is the black sheep. He doesnвЂTMt care about honing his magic. All he wants is to open up a restaurant and spend his days serving up delicious food. But when he sees a customer crying and wishes for her to be happy, he inadvertently transforms his old wooden soup spoon into a wand, and realizes that maybe a little bit of kitchen magic is just what his customers need. Addison Allbright is The Phantom Foodie, an anonymous food critic notorious for his scathing reviews. For most people, being paid to eat would be a dream job. Not for Addison. He doesnвЂTMt care for overpriced designer food. HeвЂTMs a tea and toast kind of guy. Until both the food and the owner of L'Osteria Di Pomodoro sweep him off his feet and throw his neat, orderly life completely off-kilter. Frankie isnвЂTMt sure how to tell Addison heвЂTMs a witch, or that he charmed AddisonвЂTMs food the night they first met, without sounding totally crazy. But little does he know that Addison has secrets too. Not only did he snark FrankieвЂTMs restaurant in his last review column, heвЂTMs also engaged to be married…to a woman.
Read more…
English [en] · MOBI · 0.2MB · 2013 · 📕 Book (fiction) · 🚀/lgli/lgrs/zlib · Save
base score: 11045.0, final score: 25.706497
upload/imslp/Canale, Floriano/IMSLP265202-PMLP166470-11CanNuvAllparts.pdf
IMSLP265202-PMLP166470-11CanNuvAllparts.pdf PDFMerge! (http://www.pdfmerge.com)
PDF · 0.2MB · 🎶 Musical score · 🚀/upload · Save
base score: 9861.0, final score: 24.436043
lgli/Корона Видео-Асс № 07 (1995).djvu
Корона Видео-Асс Видео-Асс, Видео-Асс КОРОНА, 1995
Russian [ru] · DJVU · 77.0MB · 1995 · 📘 Book (non-fiction) · 🚀/lgli/lgrs · Save
base score: 11045.0, final score: 23.83213
upload/docer/4937123.bin
4937123.bin
PDF · 0.9MB · 📗 Book (unknown) · 🚀/upload · Save
base score: 10934.0, final score: 23.812168
lgli/雅丝米娜·雷札(Yasmina Reza) - 杀戮之神 (雅丝米娜·雷札作品集) (2018, 上海译文出版社).mobi
杀戮之神 (雅丝米娜·雷札作品集) 雅丝米娜·雷札(Yasmina Reza) 上海译文出版社, 2018
Chinese [zh] · MOBI · 0.3MB · 2018 · 📘 Book (non-fiction) · 🚀/lgli/zlib · Save
base score: 11040.0, final score: 20.901743
lgli/2008\2008-10-19\Tori Carrington, Julie Elizabeth Leto, Julie Kenner, Leslie Kelly - Best of Temptation Bundle (html).html
Best of Temptation Bundle (Harlequin Special Releases) Carrington, Tori; Leto, Julie Elizabeth; Kenner, Julie; Kelly, Leslie Torstar Corporation / Harlequin Enterprises Limited, Toronto, Ontario, New York State, 2007
Sample the sexiest stories from the hottest Harlequin Temptation authors! Bundle includes Constant Craving by Tori Carrington, Private Lessons by Julie Elizabeth Leto, Nobody Does it Better by Julie Kenner, and Night Whispers by Leslie Kelly.
Read more…
English [en] · HTML · 1.8MB · 2007 · 📕 Book (fiction) · 🚀/lgli/lgrs/zlib · Save
base score: 11050.0, final score: 17.95616
lgli/Debbie Macomber [Macomber, Debbie] - Those Christmas Angels (2013, Mira).epub
THOSE CHRISTMAS ANGELS (Angels Everywhere Book 5) Debbie Macomber [Macomber, Debbie] Harlequin MIRA, Angels Everywhere, Place of publication not identified, 2013
Three delightful angels come down to earth--just in time for Christmas!Shirley, Goodness and Mercy: three well-intentioned angels who are occasionally allowed to intervene (or--perhaps more accurately--interfere!) in human affairs. Despite their frequent misadventures, despite the chaos they often cause, things always seem to turn out right.Their latest prayer request comes from the Seattle area. Anne Fletcher sees her son, Roy, becoming a bitter, career-obsessed man. She prays for a special woman to be sent into Roy's life, a woman who'll show him what really matters.The angels swoop down and find a way to throw Julie Wilcoff in his path--literally! From that moment on, Shirley, Goodness and Mercy shall follow them...whispering suggestions, arranging encounters, hoping for the best.
Read more…
English [en] · EPUB · 0.6MB · 2013 · 📕 Book (fiction) · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 17.737965
zlib/no-category/Owen, J. M, Rogers, Ruth H/Flow and heat transfer in rotating-disc systems_120711927.pdf
Flow and Heat Transfer in Rotating-Disc Systems: Rotating Cavities (Mechanical Engineering Research Studies, Engineering Design) Owen, J. M, Rogers, Ruth H Taunton, Somerset, England : Research Studies Press ; New York : Wiley, Mechanical engineering research studies., 1-2, Taunton, Somerset, England, New York, England, 1989
2 volumes : 24 cm, Includes bibliographical references (v. 1, pages 265-274; v. 2, p. 287-292) and indexes, v. 1. Rotor-stator systems -- v. 2. Rotating cavities
Read more…
English [en] · PDF · 12.0MB · 1989 · 📗 Book (unknown) · 🚀/ia/zlib · Save
base score: 11068.0, final score: 15.422003
zlib/no-category/Owen, J. M, Rogers, Ruth H/Flow and heat transfer in rotating-disc systems_120759701.pdf
Flow and Heat Transfer in Rotating-Disc Systems: Rotating Cavities (Mechanical Engineering Research Studies, Engineering Design) Owen, J. M, Rogers, Ruth H Taunton, Somerset, England : Research Studies Press ; New York : Wiley, Mechanical engineering research studies., 1-2, Taunton, Somerset, England, New York, England, 1989
2 v. : 24 cm, Includes bibliographical references (v. 1, p. 265-274; v. 2, p. 287-292) and indexes, v. 1. Rotor-stator systems -- v. 2. Rotating cavities
Read more…
English [en] · PDF · 12.2MB · 1989 · 📗 Book (unknown) · 🚀/ia/zlib · Save
base score: 11068.0, final score: 15.394443
Previous 1 Next
Previous 1 Next
Anna’s Archive
Home
Search
Donate
🧬 SciDB
FAQ
Account
Log in / Register
Recover secret key
Account
Public profile
Downloaded files
My donations
Referrals
Explore
Activity
Codes Explorer
ISBN Visualization ↗
Community Projects ↗
Open data
Datasets
Torrents
LLM data
Stay in touch
Contact email
Anna’s Blog ↗
Reddit ↗
Matrix ↗
Help out
Improve metadata
Volunteering & Bounties
Translate ↗
Development
Anna’s Software ↗
Security
DMCA / copyright claims
Alternatives
annas-archive.gl ↗
annas-archive.pk ↗
annas-archive.gd ↗
SLUM [unaffiliated] ↗
SLUM 2 [unaffiliated] ↗