http://dbpedia.org/ontology/abstract
|
القرصنة: فن الاستغلال (بالإنجليزية: hacking:the art of exploitation) هو كتاب لجون إريكسون حول أمن الحاسبات والشبكات.
, Hacking: The Art of Exploitation (ISBN 1-5 … Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by about computer security and network security. It was published by No Starch Press in 2003, with a second edition in 2008. All of the examples in the book were developed, compiled, and tested on Gentoo Linux.ped, compiled, and tested on Gentoo Linux.
|
http://dbpedia.org/ontology/isbn
|
978-1593271442
|
http://dbpedia.org/ontology/literaryGenre
|
http://dbpedia.org/resource/Computer_Science +
|
http://dbpedia.org/ontology/mediaType
|
http://dbpedia.org/resource/Paperback +
|
http://dbpedia.org/ontology/numberOfPages
|
488
|
http://dbpedia.org/ontology/publisher
|
http://dbpedia.org/resource/No_Starch_Press +
|
http://dbpedia.org/ontology/thumbnail
|
http://commons.wikimedia.org/wiki/Special:FilePath/Hackingexplota.jpg?width=300 +
|
http://dbpedia.org/ontology/wikiPageExternalLink
|
http://blog.wired.com/geekdad/2008/03/geekdad-review.html%7Ctitle=GeekDad +
|
http://dbpedia.org/ontology/wikiPageID
|
2379185
|
http://dbpedia.org/ontology/wikiPageLength
|
18018
|
http://dbpedia.org/ontology/wikiPageRevisionID
|
1100010791
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/Return-to-libc_attack +
, http://dbpedia.org/resource/Shor%27s_Algorithm +
, http://dbpedia.org/resource/OSI_Model +
, http://dbpedia.org/resource/Computer_security +
, http://dbpedia.org/resource/Category:Computer_security_books +
, http://dbpedia.org/resource/Port_scanning +
, http://dbpedia.org/resource/Intrusion_prevention_systems +
, http://dbpedia.org/resource/Perl +
, http://dbpedia.org/resource/Openwall_Project +
, http://dbpedia.org/resource/Dictionary_attack +
, http://dbpedia.org/resource/File:Call_stack_layout.svg +
, http://dbpedia.org/resource/Debugging +
, http://dbpedia.org/resource/RSA_%28algorithm%29 +
, http://dbpedia.org/resource/Denial_of_service_attack +
, http://dbpedia.org/resource/Symmetric_encryption +
, http://dbpedia.org/resource/System_Daemon +
, http://dbpedia.org/resource/Ping_Flooding +
, http://dbpedia.org/resource/Computer_Science +
, http://dbpedia.org/resource/Spoofed_packets +
, http://dbpedia.org/resource/Cryptography +
, http://dbpedia.org/resource/Wi-Fi +
, http://dbpedia.org/resource/OSI_model +
, http://dbpedia.org/resource/Assembly_programming +
, http://dbpedia.org/resource/Asymmetric_encryption +
, http://dbpedia.org/resource/Global_Offset_Table +
, http://dbpedia.org/resource/FMS_attack +
, http://dbpedia.org/resource/Jon_%22Smibbs%22_Erickson +
, http://dbpedia.org/resource/Quantum_computer +
, http://dbpedia.org/resource/Kernel_%28operating_system%29 +
, http://dbpedia.org/resource/Category:American_non-fiction_books +
, http://dbpedia.org/resource/No_Starch_Press +
, http://dbpedia.org/resource/Paperback +
, http://dbpedia.org/resource/Address_space_layout_randomization +
, http://dbpedia.org/resource/File:Hackingexplota.jpg +
, http://dbpedia.org/resource/Linux +
, http://dbpedia.org/resource/Exploit_%28computer_security%29 +
, http://dbpedia.org/resource/File:Public_key_encryption.svg +
, http://dbpedia.org/resource/Claude_Shannon +
, http://dbpedia.org/resource/Format_string +
, http://dbpedia.org/resource/Category:Works_about_computer_hacking +
, http://dbpedia.org/resource/Internet_socket +
, http://dbpedia.org/resource/Computer_network +
, http://dbpedia.org/resource/Packet_sniffer +
, http://dbpedia.org/resource/Computer_programming +
, http://dbpedia.org/resource/Network_security +
, http://dbpedia.org/resource/Low-level_programming_language +
, http://dbpedia.org/resource/Ping_of_Death +
, http://dbpedia.org/resource/Category:2003_non-fiction_books +
, http://dbpedia.org/resource/Gentoo_Linux +
, http://dbpedia.org/resource/Call_stack +
, http://dbpedia.org/resource/Category:English-language_books +
, http://dbpedia.org/resource/Unix +
, http://dbpedia.org/resource/Wired_Equivalent_Privacy +
, http://dbpedia.org/resource/Assembly_%28programming%29 +
, http://dbpedia.org/resource/Denial_of_service +
, http://dbpedia.org/resource/Man-in-the-middle_attack +
, http://dbpedia.org/resource/IP_address +
, http://dbpedia.org/resource/Category:No_Starch_Press_books +
, http://dbpedia.org/resource/Quantum_key_distribution +
, http://dbpedia.org/resource/Buffer_overflow +
, http://dbpedia.org/resource/PaX +
, http://dbpedia.org/resource/Packet_sniffing +
, http://dbpedia.org/resource/Control_structure +
, http://dbpedia.org/resource/Grover%27s_algorithm +
, http://dbpedia.org/resource/Vulnerability_%28computing%29 +
, http://dbpedia.org/resource/Network_administrator +
, http://dbpedia.org/resource/Data_buffer +
, http://dbpedia.org/resource/Transmission_Control_Protocol +
, http://dbpedia.org/resource/One-time_pad +
, http://dbpedia.org/resource/John_the_Ripper +
, http://dbpedia.org/resource/File:OSI_Model_v1.svg +
, http://dbpedia.org/resource/Cryptology +
|
http://dbpedia.org/property/author
|
Jon Erickson
|
http://dbpedia.org/property/country
|
United States
|
http://dbpedia.org/property/genre
|
http://dbpedia.org/resource/Computer_Science +
|
http://dbpedia.org/property/isbn
|
978
|
http://dbpedia.org/property/language
|
English
|
http://dbpedia.org/property/mediaType
|
Print Paperback
|
http://dbpedia.org/property/name
|
Hacking: The Art of Exploitation Second Edition
|
http://dbpedia.org/property/pages
|
488
|
http://dbpedia.org/property/pubDate
|
February 2008
|
http://dbpedia.org/property/publisher
|
No Starch Press
|
http://dbpedia.org/property/series
|
Second Edition
|
http://dbpedia.org/property/wikiPageUsesTemplate
|
http://dbpedia.org/resource/Template:Cite_news +
, http://dbpedia.org/resource/Template:Reflist +
, http://dbpedia.org/resource/Template:More_citations_needed +
, http://dbpedia.org/resource/Template:More_footnotes +
, http://dbpedia.org/resource/Template:Advert +
, http://dbpedia.org/resource/Template:Multiple_issues +
, http://dbpedia.org/resource/Template:Infobox_book +
, http://dbpedia.org/resource/Template:Notability +
, http://dbpedia.org/resource/Template:Short_description +
, http://dbpedia.org/resource/Template:ISBN +
, http://dbpedia.org/resource/Template:Citation_needed +
|
http://purl.org/dc/elements/1.1/publisher
|
No Starch Press
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:English-language_books +
, http://dbpedia.org/resource/Category:No_Starch_Press_books +
, http://dbpedia.org/resource/Category:2003_non-fiction_books +
, http://dbpedia.org/resource/Category:Works_about_computer_hacking +
, http://dbpedia.org/resource/Category:Computer_security_books +
, http://dbpedia.org/resource/Category:American_non-fiction_books +
|
http://purl.org/linguistics/gold/hypernym
|
http://dbpedia.org/resource/Book +
|
http://www.w3.org/ns/prov#wasDerivedFrom
|
http://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitation?oldid=1100010791&ns=0 +
|
http://xmlns.com/foaf/0.1/depiction
|
http://commons.wikimedia.org/wiki/Special:FilePath/Hacking_Book_Cover_second_edition.jpg +
, http://commons.wikimedia.org/wiki/Special:FilePath/Hackingexplota.jpg +
, http://commons.wikimedia.org/wiki/Special:FilePath/OSI_Model_v1.svg +
, http://commons.wikimedia.org/wiki/Special:FilePath/Call_stack_layout.svg +
, http://commons.wikimedia.org/wiki/Special:FilePath/Public_key_encryption.svg +
|
http://xmlns.com/foaf/0.1/isPrimaryTopicOf
|
http://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitation +
|
http://xmlns.com/foaf/0.1/name
|
Hacking: The Art of Exploitation Second Edition
|
owl:sameAs |
http://www.wikidata.org/entity/Q5637303 +
, https://global.dbpedia.org/id/4kLh9 +
, http://rdf.freebase.com/ns/m.0bryzrm +
, http://ar.dbpedia.org/resource/%D8%A7%D9%84%D9%82%D8%B1%D8%B5%D9%86%D8%A9:_%D9%81%D9%86_%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%BA%D9%84%D8%A7%D9%84 +
, http://dbpedia.org/resource/Hacking:_The_Art_of_Exploitation +
|
rdf:type |
http://schema.org/CreativeWork +
, http://www.wikidata.org/entity/Q386724 +
, http://dbpedia.org/ontology/Work +
, http://dbpedia.org/ontology/Book +
, http://purl.org/ontology/bibo/Book +
, http://www.wikidata.org/entity/Q571 +
, http://dbpedia.org/ontology/WrittenWork +
, http://schema.org/Book +
, http://www.wikidata.org/entity/Q234460 +
|
rdfs:comment |
Hacking: The Art of Exploitation (ISBN 1-5 … Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by about computer security and network security. It was published by No Starch Press in 2003, with a second edition in 2008. All of the examples in the book were developed, compiled, and tested on Gentoo Linux.ped, compiled, and tested on Gentoo Linux.
, القرصنة: فن الاستغلال (بالإنجليزية: hacking:the art of exploitation) هو كتاب لجون إريكسون حول أمن الحاسبات والشبكات.
|
rdfs:label |
Hacking: The Art of Exploitation
, القرصنة: فن الاستغلال
|