Home Page Icon
Home Page
Table of Contents for
Part II: The UNIX Family, Mac OS X, and Windows
Close
Part II: The UNIX Family, Mac OS X, and Windows
by Massimiliano Oldani, Enrico Perla
A Guide to Kernel Exploitation
Cover
Title Page
Copyright
Table of Contents
Forword
Preface
Acknowledgments
About the Authors
About the Technical Editor
Part I: A Journey to Kernel Land
Introduction
Chapter 1: From User-Land to Kernel-Land Attacks
Chapter 2: A Taxonomy of Kernel Vulnerabilities
Chapter 3: Stairway to Successful Kernel Exploitation
Part II: The UNIX Family, Mac OS X, and Windows
Introduction
Chapter 4: The UNIX Family
Chapter 5: Mac OS X
Chapter 6: Windows
Part III: Remote Kernel Exploitation
Introduction
Chapter 7: Facing the Challenges of Remote Kernel Exploitation
Chapter 8: Putting It All Together
Part IV: Final Words
Introduction
Chapter 9: Kernel Evolution
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 3: Stairway to Successful Kernel Exploitation
Next
Next Chapter
Introduction
PART II
The UNIX Family, Mac OS X, and Windows
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset