⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 lib0025.html

📁 Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Manag
💻 HTML
📖 第 1 页 / 共 2 页
字号:
<html>
<META http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>References</title>
<link rel="STYLESHEET" type="text/css" href="images/xpolecat.css">
<link rel="STYLESHEET" type="text/css" href="images/ie.content.books24x7.css">
</head>
<body >
<table width="100%" border="0" cellspacing="0" cellpadding="0">
<td><div STYLE="MARGIN-LEFT: 0.15in;">
<a href="toc.html"><img src="images/teamlib.gif" width="62" height="15" border="0" align="absmiddle"  alt="Team LiB"></a></div></td>
<td valign="top" class="v2" align="right"><div STYLE="MARGIN-RIGHT: 0.15in"><a href="LiB0024.html"><img src="images/previous.gif" width="62" height="15" border="0" align="absmiddle" alt="Previous Section"></a>
<a href="LiB0026.html"><img src="images/next.gif" width="41" height="15" border="0" align="absmiddle" alt="Next Section"></a>
</div></td></tr>
</table>

<div class="chapter">
<a name="ch02"></a>
<div class="section">
<h2 class="first-section-title"><a name="283"></a><a name="ch02lev1sec6"></a>References</h2><a name="284"></a><a name="IDX-123"></a>
<div class="section">
<h3 class="sect3-title">
<a name="285"></a><a name="ch02lev2sec29"></a>Books and Articles</h3>
<p class="first-para">
</p>
<div xmlns:crossref="http://www.jclark.com/xt/java/com.books24x7.xsl.Crossref" class="bibliography">
<div class="bibliomixed">
<p>
<span class="author"><span class="firstname">Aleph </span><span class="surname">One. </span></span><span class="biblioentry-title">"Smashing the Stack for Fun and Profit." </span><i class="citetitle">Phrack</i>, <span class="issuenum">Issue 49. </span><span class="bibliomisc">This is the groundbreaking article that put buffer overflow attacks on the map.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="surname">Barnaby, </span><span class="firstname">Jack. </span></span><span class="biblioentry-title">"Win32 Buffer Overflows: Location, Exploitation, and Prevention." </span><i class="citetitle">Phrack</i>, <span class="issuenum">Issue 55.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="authorgroup"><span class="author"><span class="surname">Bovet, </span><span class="firstname">D. and </span></span><span class="author"><span class="firstname">M. </span><span class="surname">Cesati. </span></span></span><i class="citetitle">Understanding the Linux Kernel: From I/O Ports to Process Management</i>. <span class="copyright"><span class="year">2002</span></span>, <span class="publisher"><span class="publishername">O'Reilly &amp; Associates, </span></span><span class="isbn">ISBN: 0596000022. </span><span class="bibliomisc">These authors do an exceptional job of presenting a conceptual view of how the Linux kernel operates. Generally this book should be read before you tackle Maxwell's.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="surname">Burgess, </span><span class="firstname">Richard. </span></span><i class="citetitle">MMURTL V1.0</i>. <span class="copyright"><span class="year">2000</span></span>, <span class="publisher"><span class="publishername">Sensory Publishing, Inc., </span></span><span class="isbn">ISBN: 1588530000. </span><span class="bibliomisc">There were some people in the computer subculture that suspected that Richard's book had been suppressed by the powers that be. Thankfully, they were wrong. MMURTL is back and in print. Burgess does a particularly nice job of explaining the hardware interface.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="surname">Cesare, </span><span class="firstname">Silvio. </span></span><span class="biblioentry-title">"Runtime Kernel Kmem Patching." </span><span class="copyright"><span class="year">1998</span></span>, <span class="address"><a target="_top" class="url" href="http://www.big.net.au/~silvio/runtime-kernel-kmem-patching.txt">http://www.big.net.au/~silvio/runtime-kernel-kmem-patching.txt</a>. </span><span class="bibliomisc">This is the canonical article on kernel patching. Almost every article on Linux kernel patching can be traced to this article in one way or another.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="authorgroup"><span class="author"><span class="firstname">Chebotko,</span></span><span class="author"><span class="surname">Kalatchin, </span><span class="firstname">Kiselev, and </span></span><span class="author"><span class="firstname">Podvoisky. </span></span></span><i class="citetitle">Assembly Language Master Class</i>. <span class="copyright"><span class="year">1994</span></span>, <span class="publisher"><span class="publishername">Wrox Press Inc., </span></span><span class="isbn">ISBN: 1874416346. </span><span class="bibliomisc">This book details a functional DPMI server for DOS.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="address">&lt;<a href="mailto:halflife@infonexus.com">halflife@infonexus.com</a>&gt;. </span><span class="biblioentry-title">"Abuse of the Linux Kernel for Fun and Profit." </span><i class="citetitle">Phrack</i>, <span class="issuenum">Issue 50. </span><span class="bibliomisc">This article describes the steps needed to hijack a user-TTY via LKMs.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="authorgroup"><span class="author"><span class="surname">Hatch, </span><span class="firstname">B.,</span></span><span class="author"><span class="firstname">J. </span><span class="surname">Lee, and </span></span><span class="author"><span class="firstname">G. </span><span class="surname">Kurtz. </span></span></span><i class="citetitle">Hacking Linux Exposed</i>. <span class="copyright"><span class="year">2001</span></span>, <span class="publisher"><span class="publishername">McGraw-Hill, </span></span><span class="isbn">ISBN: 0072127732.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="surname"><i class="emphasis"><a name="286"></a><a name="IDX-124"></a></i>Hoglund, </span><span class="firstname">Greg. </span></span><span class="biblioentry-title">"A *REAL* NT Rootkit: Patching the NT Kernel." </span><i class="citetitle">Phrack</i>, <span class="issuenum">Issue 55. </span><span class="bibliomisc">This is an interesting article on NT kernel internals. The author also does a nice job of setting the tone of his article.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="surname">Maxwell, </span><span class="firstname">Scott. </span></span><i class="citetitle">Linux Core Kernel Commentary, 2nd Edition</i>. <span class="copyright"><span class="year">1999</span></span>, <span class="orgname">The Coriolis Group, </span><span class="isbn">ISBN: 1588801497. </span><span class="bibliomisc">This sizeable book is basically a guided tour of the source code. Be warned; you will need several book markers to read this text.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="firstname">Palmers. </span></span><span class="biblioentry-title">"Sub proc_root Quando Sumus (Advances in Kernel Hacking)." </span><i class="citetitle">Phrack</i>, <span class="issuenum">Issue 58. </span><span class="bibliomisc">This article focuses on manipulating the /proc file system using LKMs. The Latin title is fun too; there is nothing like a Pythonesque sense of humor. (Wink, wink, nudge, nudge.)</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="authorgroup"><span class="author"><span class="surname">Patterson, </span><span class="firstname">D. and </span></span><span class="author"><span class="firstname">J. </span><span class="surname">Hennessy. </span></span></span><i class="citetitle">Computer Architecture: A Quantitative Approach</i>. <span class="copyright"><span class="year">1996</span></span>, <span class="publisher"><span class="publishername">Morgan Kaufmann Publishers, </span></span><span class="isbn">ISBN: 1558603298. </span><span class="bibliomisc">Every hardware engineer I know has a copy of this book, and with good reason. This book provides a universally effective approach for analyzing processor performance.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="authorgroup"><span class="author"><span class="surname">Ray, </span><span class="firstname">J. and </span></span><span class="author"><span class="firstname">Anonymous. </span></span></span><i class="citetitle">Maximum Linux Security</i>. <span class="copyright"><span class="year">2001</span></span>, <span class="publisher"><span class="publishername">Sams, </span></span><span class="isbn">ISBN: 0672321343.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="author"><span class="surname">Schreiber, </span><span class="firstname">Sven. </span></span><i class="citetitle">Undocumented Windows 2000 Secrets: A Programmer's Cookbook</i>. <span class="copyright"><span class="year">2001</span></span>, <span class="publisher"><span class="publishername">Addison-Wesley, </span></span><span class="isbn">ISBN: 0201721872. </span><span class="bibliomisc">The title of this book is well deserved. This is an engrossing exploration of the Windows 2000 operating system by an author who knows what he's doing. Sven covers a lot more ground than I had space to. He also provides a number of handy tools. If you are hungry to find out more about Window's internals, get a copy of this book.</span>
</p>
</div>
<div class="bibliomixed">
<p>
<span class="authorgroup"><span class="author"><span class="firstname">SD and </span></span><span class="author"><span class="firstname">Devik. </span></span></span><span class="biblioentry-title">"Linux on-the-fly kernel patching without LKM." </span><i class="citetitle">Phrack</i>, <span class="issuenum">Issue 58. </span><span class="bibliomisc">This article is concerned with manipulating <span class="fixed">/dev/kmem</span>. The bad news is that they assume that the reader has already attained root status.</span>
</p>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -