£54.87

Morgan & Claypool The Continuing Arms Race: Code-Reuse Attacks and Defenses (ACM Books)

Price data last checked 44 day(s) ago - refreshing...

View at Amazon

Price History & Forecast

Last 47 days • 47 data points (No recent data available)

Historical
Generating forecast...
£54.87 £51.61 £52.32 £53.03 £53.75 £54.46 £55.17 25 January 2026 05 February 2026 17 February 2026 28 February 2026 12 March 2026

Price Distribution

Price distribution over 47 days • 3 price levels

Days at Price
Current Price
27 days 9 days 11 days · current 0 7 14 20 27 £52 £54 £55 Days at Price

Price Analysis

Most common price: £52 (27 days, 57.4%)

Price range: £52 - £55

Price levels: 3 different prices over 47 days

Description

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Key Features

Pages Count - 304. Binding type - Perfect.

Product Specifications

Format
Paperback
Domain
Amazon UK
Release Date
28 February 2018
Listed Since
28 February 2018

Barcode

No barcode data available

Similar Products You Might Like

MALicious softWARE: Omnibus
93% match

MALicious softWARE: Omnibus

£81.39 25 Jan 2026
MALicious softWARE: Omnibus
93% match

MALicious softWARE: Omnibus

£98.12 31 Jan 2026
Springer Cyberspace Mimic Defense - Wireless Network Security
93% match

Springer Cyberspace Mimic Defense - Wireless Network Security

Springer

£136.00 18 Apr 2026
Cyber Arms: Security in Cyberspace
92% match

Cyber Arms: Security in Cyberspace

CRC Press

£162.91 16 Feb 2026
Malware Forensics: Investigating and Analyzing Malicious Code
92% match

Malware Forensics: Investigating and Analyzing Malicious Code

Syngress

£44.99 07 Mar 2026
Network Attacks and Defenses: A Hands-on Approach
92% match

Network Attacks and Defenses: A Hands-on Approach

CRC Press

£94.99 08 Apr 2026
Architecting Secure Software Systems
92% match

Architecting Secure Software Systems

CRC Press

£120.76 24 Feb 2026
Proactive and Dynamic Network Defense: 74 (Advances in Information Security, 74)
92% match

Proactive and Dynamic Network Defense: 74 (Advances in Information Security, 74)

Springer

£90.67 31 Mar 2026
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)
92% match

Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems)

£121.64 12 Jan 2026
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
92% match

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

Packt Publishing

£41.99 15 Feb 2026
Web Hacking Arsenal and Ethical Hacking Set
92% match

Web Hacking Arsenal and Ethical Hacking Set

£64.46 12 Jan 2026
Code Clone Analysis: Research, Tools, and Practices
92% match

Code Clone Analysis: Research, Tools, and Practices

£115.22 06 Jan 2026
Android Security: Attacks and Defenses
92% match

Android Security: Attacks and Defenses

CRC Press

£61.19 12 Apr 2026
Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition
92% match

Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition

Packt Publishing

£38.99 07 Mar 2026
Springer Binary Code Fingerprinting for Cybersecurity Book
92% match

Springer Binary Code Fingerprinting for Cybersecurity Book

Springer

£109.76 06 Mar 2026
Testing Code Security
92% match

Testing Code Security

CRC Press

£105.00 26 Feb 2026
Springer Advances in Cyber Security - Principles and Techniques
92% match

Springer Advances in Cyber Security - Principles and Techniques

Springer

£94.25 15 Apr 2026
Secure Programming Cookbook for C & C++ (Cookbooks Ser.)
92% match

Secure Programming Cookbook for C & C++ (Cookbooks Ser.)

O'Reilly

£34.35 08 Jan 2026
Proliferation of Weapons- and Dual-Use Technologies: Diplomatic, Information, Military, and Economic Approaches (Advanced Sciences and Technologies for Security Applications)
92% match

Proliferation of Weapons- and Dual-Use Technologies: Diplomatic, Information, Military, and Economic Approaches (Advanced Sciences and Technologies for Security Applications)

Springer

£99.42 09 Mar 2026
Springer Adaptive Autonomous Secure Cyber Systems Book
92% match

Springer Adaptive Autonomous Secure Cyber Systems Book

Springer

£115.91 20 Apr 2026
Adaptive Autonomous Secure Cyber Systems
92% match

Adaptive Autonomous Secure Cyber Systems

Springer

£109.99 11 Feb 2026
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
92% match

Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment

Springer

£87.47 23 Feb 2026
CryptoGraphics: Exploiting Graphics Cards For Security: 20 (Advances in Information Security, 20)
92% match

CryptoGraphics: Exploiting Graphics Cards For Security: 20 (Advances in Information Security, 20)

Springer

£59.97 08 Mar 2026
Introduction to Computer and Network Security: Navigating Shades of Gray
92% match

Introduction to Computer and Network Security: Navigating Shades of Gray

CRC Press

£57.41 30 Jan 2026