0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R100 - R250 (2)
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Building Secure Defenses Against Code-Reuse Attacks (Paperback, 1st ed. 2015): Lucas Davi, Ahmad-Reza Sadeghi Building Secure Defenses Against Code-Reuse Attacks (Paperback, 1st ed. 2015)
Lucas Davi, Ahmad-Reza Sadeghi
R1,582 Discovery Miles 15 820 Ships in 18 - 22 working days

This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field. It provides advanced-level students studying computer science with a comprehensive overview and clear understanding of important runtime attacks.

Mobile Platform Security (Paperback): N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena... Mobile Platform Security (Paperback)
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, …
R982 Discovery Miles 9 820 Ships in 18 - 22 working days

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.

Automated Software Diversity (Paperback): Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz Automated Software Diversity (Paperback)
Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
R794 Discovery Miles 7 940 Ships in 18 - 22 working days

Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions.

valentine's day - Best Happy Valentine's Day Images And Quotes (Paperback): Lucas Davis valentine's day - Best Happy Valentine's Day Images And Quotes (Paperback)
Lucas Davis
R246 Discovery Miles 2 460 Ships in 18 - 22 working days
Angry Fu*k Coloring Book For Adults 60 Unique Swear Words - Swear Word Coloring Book for Adults - Cuss Words Seamless patterns... Angry Fu*k Coloring Book For Adults 60 Unique Swear Words - Swear Word Coloring Book for Adults - Cuss Words Seamless patterns color for stress free mindfulness and relaxation (Paperback)
Lucas Davis
R173 Discovery Miles 1 730 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Giorgio Armani Acqua Di Gioia Eau De…
R3,128 Discovery Miles 31 280
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan Paperback R380 R339 Discovery Miles 3 390
Silent Witness - Season 28
Emilia Fox, David Caves DVD R502 Discovery Miles 5 020
Happier Than Ever
Billie Eilish CD  (1)
R380 Discovery Miles 3 800
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn Paperback  (5)
R199 R183 Discovery Miles 1 830
Dala A2 Sketch Pad (120gsm)(36 Sheets)
R283 Discovery Miles 2 830
Omhels - 100 Oordenkings om te weet God…
Lysa Terkeurst Hardcover R249 R229 Discovery Miles 2 290
John C. Maxwell Undated Planner
Paperback R469 R431 Discovery Miles 4 310

 

Partners