We strive to deliver the best value to our customers and ensure complete satisfaction for all our textbook rentals.
You can return your online books for any reason within our refund period – no questions asked.
Every order is available for express shipping, and return shipping is always free.
You'll be happy with the quality of your books (or we'll ship you another one on our dime).
You can extend your rental at any time – at the same cheap daily rental rate.
If you decide to keep the book it will never cost more than the purchase price.
As always, you have access to over 5 million titles. Plus, you can choose from 5 rental periods, so you only pay for what you’ll use. And if you ever run into trouble, our top-notch U.S. based Customer Service team is ready to help by email, chat or phone.
Supplemental materials are not guaranteed for used textbooks or rentals (access codes, DVDs, workbooks).
Memory Error Exploits in C: Vulnerabilities and Countermeasures
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by attackers to perform code injection attacks. Next, we discuss countermeasures that provide protection against these kinds of attacks. This book starts off by presenting a comprehensive and structured survey of vulnerabilities and countermeasures...
In this book we examine a number of vulnerabilities in C-like languages that can be exploited by attackers to perform code injection attacks. Next, we discuss countermeasures that provide protection against these kinds of attacks. This book starts off by presenting a comprehensive and structured survey of vulnerabilities and countermeasures for code injection in C-like languages. Various countermeasures make different trade-offs in terms of performance, e¿ectivity, memory cost, compatibility, etc. This makes it hard to evaluate and compare the adequacy of proposed countermeasures in a given context. This survey defines a classification and evaluation framework, on the basis of which advantages and disadvantages of countermeasures can be assessed. This is followed by an in-depth discussion of two novel countermeasures which aim to better protect against attacks while having only a negligible impact on performance. The first countermeasure focuses on stack-based buffer overflows, while the second aims at heap- based buffer overflows and double frees. This book will be of interest to computer scientists and readers interested in security and operating systems.
Since launching the first textbook rental site in 2006, BookRenter has never wavered from our mission to make education more affordable for all students. Every day, we focus on delivering students the best prices, the most flexible options, and the best service on earth. On March 13, 2012 BookRenter.com, Inc. formally changed its name to Rafter, Inc. We are still the same company and the same people, only our corporate name has changed.