Narrow your search
Listing 1 - 10 of 18 << page
of 2
>>
Sort by

Book
BONG HiTS 4 JESUS : a perfect constitutional storm in Alaska's capital
Author:
ISBN: 1602230900 9781602230903 9781602230897 1602230897 Year: 2010 Publisher: Fairbanks : University of Alaska Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In January 2002, for the first time, the Olympic Torch Relay visited Alaska on its way to the Winter Games. When the relay runner and accompanying camera cars passed Juneau-Douglas High School, senior Joseph Frederick and several friends unfurled a fourteen-foot banner reading ""BONG HiTS 4 JESUS."" An in-depth look at student rights within a public high school, this book chronicles the events that followed: Frederick's suspension, the subsequent suit against the school district, and, ultimately, the escalation of a local conflict into a federal case. Brought to life through interviews with th.

Keywords

Freedom of speech --- High school students --- Students --- Legal status, laws, etc. --- Civil rights --- Education --- Morse, Deborah, --- Frederick, Joseph --- City and Borough of Juneau School District --- Greater Juneau Borough School District, Alaska --- Juneau (Alaska). --- Juneau School District --- Morse, Deborah (School principal) --- Trials, litigation, etc. --- United States --- Alaska --- United States. --- Alaska. --- Â-lâ-sṳ̂-k --- AK --- Alaasika --- ʻĀlaka --- Alasca --- Alasijia --- Alasijia Zhou --- Alaska Eyâleti --- Alaska osariik --- Alaska Territory --- Alasḳah --- Alasko --- Alaszka --- Ali͡ask --- Ali͡aska --- Aljaška --- Allaesŭkʻa --- Allaesŭkʻa-ju --- Allaesŭkʻaju --- Alyaska --- Alyaska Shitati --- Arasuka --- Arasuka-sh --- Arasukash --- Civitas Alascae --- Estado de Alaska --- Estado ng Alaska --- Hakʼaz Dineʼé Bikéyah Hahoodzo --- Medinat Alasḳah --- Politeia tēs Alaska --- Russian America --- Russkai͡a Amerika --- Shtat Ali͡aska --- State of Alaska --- Statul Alaska --- Territory of Alaska --- ABŞ --- ABSh --- Ameerika Ühendriigid --- America (Republic) --- Amerika Birlăshmish Shtatlary --- Amerika Birlăşmi Ştatları --- Amerika Birlăşmiş Ştatları --- Amerika ka Kelenyalen Jamanaw --- Amerika Qūrama Shtattary --- Amerika Qŭshma Shtatlari --- Amerika Qushma Shtattary --- Amerika (Republic) --- Amerikai Egyesült Államok --- Amerikanʹ Veĭtʹsėndi͡avks Shtattnė --- Amerikări Pĕrleshu̇llĕ Shtatsem --- Amerikas Forenede Stater --- Amerikayi Miatsʻyal Nahangner --- Ameriketako Estatu Batuak --- Amirika Carékat --- AQSh --- Ar. ha-B. --- Arhab --- Artsot ha-Berit --- Artzois Ha'bris --- Bí-kok --- Ē.P.A. --- É.-U. --- EE.UU. --- Egyesült Államok --- ĒPA --- Estados Unidos --- Estados Unidos da América do Norte --- Estados Unidos de América --- Estaos Xuníos --- Estaos Xuníos d'América --- Estatos Unitos --- Estatos Unitos d'America --- Estats Units d'Amèrica --- Ètats-Unis d'Amèrica --- États-Unis d'Amérique --- ÉU --- Fareyniḳṭe Shṭaṭn --- Feriene Steaten --- Feriene Steaten fan Amearika --- Forente stater --- FS --- Hēnomenai Politeiai Amerikēs --- Hēnōmenes Politeies tēs Amerikēs --- Hiwsisayin Amerikayi Miatsʻeal Tērutʻiwnkʻ --- Istadus Unidus --- Jungtinės Amerikos valstybės --- Mei guo --- Mei-kuo --- Meiguo --- Mî-koet --- Miatsʻyal Nahangner --- Miguk --- Na Stàitean Aonaichte --- NSA --- S.U.A. --- SAD --- Saharat ʻAmērikā --- SASht --- Severo-Amerikanskie Shtaty --- Severo-Amerikanskie Soedinennye Shtaty --- Si͡evero-Amerikanskīe Soedinennye Shtaty --- Sjedinjene Američke Države --- Soedinennye Shtaty Ameriki --- Soedinennye Shtaty Severnoĭ Ameriki --- Soedinennye Shtaty Si͡evernoĭ Ameriki --- Spojené obce severoamerické --- Spojené staty americké --- SShA --- Stadoù-Unanet Amerika --- Stáit Aontaithe Mheiriceá --- Stany Zjednoczone --- Stati Uniti --- Stati Uniti d'America --- Stâts Unîts --- Stâts Unîts di Americhe --- Steatyn Unnaneysit --- Steatyn Unnaneysit America --- SUA --- Sŭedineni amerikanski shtati --- Sŭedinenite shtati --- Tetã peteĩ reko Amérikagua --- U.S. --- U.S.A. --- United States of America --- Unol Daleithiau --- Unol Daleithiau America --- Unuiĝintaj Ŝtatoj de Ameriko --- US --- USA --- Usono --- Vaeinigte Staatn --- Vaeinigte Staatn vo Amerika --- Vereinigte Staaten --- Vereinigte Staaten von Amerika --- Verenigde State van Amerika --- Verenigde Staten --- VS --- VSA --- Wááshindoon Bikéyah Ałhidadiidzooígíí --- Wilāyāt al-Muttaḥidah --- Wilāyāt al-Muttaḥidah al-Amirīkīyah --- Wilāyāt al-Muttaḥidah al-Amrīkīyah --- Yhdysvallat --- Yunaeted Stet --- Yunaeted Stet blong Amerika --- ZDA --- Združene države Amerike --- Zʹi͡ednani Derz͡havy Ameryky --- Zjadnośone staty Ameriki --- Zluchanyi͡a Shtaty Ameryki --- Zlucheni Derz͡havy --- ZSA

Buffer overflow attacks
Author:
ISBN: 1597490229 9781597490221 1932266674 9781932266672 0080488420 9780080488424 9786611035846 6611035842 Year: 2005 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Annotation

Writing security tools and exploits
Authors: ---
ISBN: 1281035777 9786611035778 0080493130 1597490946 1597499978 1423754980 9781423754985 9780080493138 9781597499972 9781281035776 661103577X 9781597490948 Year: 2006 Publisher: Rockland, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will

Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
Authors: ---
ISBN: 1281020273 9786611020279 0080489729 1597490334 1597490059 9781597490054 9781597490337 9780080489728 9781281020277 6611020276 Year: 2005 Publisher: Rockland, Mass. : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and

Snort 2.0 intrusion detection
Authors: ---
ISBN: 1931836744 9786611056094 128105609X 0080481000 1932266747 9781932266740 9781931836746 6611056092 9780080481005 Year: 2003 Publisher: Rockland : Oxford : Syngress ; Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is

Hacking the code
Authors: ---
ISBN: 1931836434 9781931836432 9781932266658 1932266658 9780080478173 0080478174 1281056286 9781281056283 9781931836434 9786611056285 6611056289 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented

Writing security tools and exploits
Authors: ---
ISBN: 1423754980 9781423754985 0080493130 9780080493138 9781597499972 1597499978 Year: 2006 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.

Hacking the code
Authors: ---
ISBN: 1931836434 9781931836432 9781932266658 1932266658 9780080478173 0080478174 1281056286 9781281056283 9786611056285 6611056289 9781931836434 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented

Land in the American West : private claims and the common good
Authors: ---
ISBN: 0295802898 0295980206 9780295802893 9780295980201 Year: 2000 Publisher: Seattle : University of Washington Press,

Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
Authors: --- ---
ISBN: 9781597490054 1597490059 Year: 2004 Publisher: [Sebastopol, CA] Distributed by O'Reilly Media in the United States and Canada

Loading...
Export citation

Choose an application

Bookmark

Abstract

Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools. The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel. 5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.

Listing 1 - 10 of 18 << page
of 2
>>
Sort by