0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover): Per Larsen, Ahmad-Reza Sadeghi The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover)
Per Larsen, Ahmad-Reza Sadeghi
R2,609 Discovery Miles 26 090 Ships in 10 - 15 working days

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Automated Software Diversity (Paperback): Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz Automated Software Diversity (Paperback)
Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
R818 Discovery Miles 8 180 Ships in 10 - 15 working days

Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions.

Mastering Microsoft Endpoint Manager - Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs... Mastering Microsoft Endpoint Manager - Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs (Paperback)
Christiaan Brinkhoff, Per Larsen; Foreword by Ken Pan, Scott Manchester
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

Design and implement a secure end-to-end desktop management solution with Microsoft Endpoint Manager Key Features Learn everything you need to know about deploying and managing Windows on physical and cloud PCs Simplify remote working for cloud-managed cloud PCs via new service Windows 365 Benefit from the authors' experience of managing physical endpoints and traditional virtual desktop infrastructures (VDI) Book DescriptionMicrosoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them. With this book, you'll learn everything you need to know to make the shift to Modern Workplace, running Windows 10, Windows 11, or Windows 365. Mastering Microsoft Endpoint Manager explains various concepts in detail to give you the clarity to plan how to use Microsoft Endpoint Manager (MEM) and eliminate potential migration challenges beforehand. You'll get to grips with using new services such as Windows 365 Cloud PC, Windows Autopilot, profile management, monitoring and analytics, and Universal Print. The book will take you through the latest features and new Microsoft cloud services to help you to get to grips with the fundamentals of MEM and understand which services you can manage. Whether you are talking about physical or cloud endpoints-it's all covered. By the end of the book, you'll be able to set up MEM and use it to run Windows 10, Windows 11, and Windows 365 efficiently. What you will learn Understand how Windows 365 Cloud PC makes the deployment of Windows in the cloud easy Configure advanced policy management within MEM Discover modern profile management and migration options for physical and cloud PCs Harden security with baseline settings and other security best practices Find troubleshooting tips and tricks for MEM, Windows 365 Cloud PC, and more Discover deployment best practices for physical and cloud-managed endpoints Keep up with the Microsoft community and discover a list of MVPs to follow Who this book is forIf you are an IT professional, enterprise mobility administrator, architect, or consultant looking to learn about managing Windows on both physical and cloud endpoints using Microsoft Endpoint Manager, then this book is for you.

The Continuing Arms Race - Code-Reuse Attacks and Defenses (Paperback): Per Larsen, Ahmad-Reza Sadeghi The Continuing Arms Race - Code-Reuse Attacks and Defenses (Paperback)
Per Larsen, Ahmad-Reza Sadeghi
R2,082 Discovery Miles 20 820 Ships in 10 - 15 working days

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
Broken To Heal - Deceit, Destruction…
Alistair Izobell Paperback R200 Discovery Miles 2 000
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Return Of The Dream Canteen
Red Hot Chili Peppers CD R127 Discovery Miles 1 270
Batteries Alkaline Size:C - 2 Pieces Per…
R99 Discovery Miles 990
Raz Tech Laptop Security Chain Cable…
R299 R169 Discovery Miles 1 690
Finally Enough Love - #1's Remixed
Madonna CD  (2)
R384 Discovery Miles 3 840
Goedheid Sagmoedigheid Selfbeheersing
Jenna Nell Northwood Hardcover R99 R82 Discovery Miles 820
Everlotus CD DVD wallet, 72 discs
 (1)
R129 R99 Discovery Miles 990
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100

 

Partners