Skip to main content

Buffer overflows are among the most common security vulnerabilities in current IT systems. An attempt is made to describe how they occur, how to suppress the direct consequences and what measures can be taken to protect the overall system. More details you can find here.

Authors
Alexander Schinner
Event
Probevorlesung
Host
Faktultät für Informatik und Mathematik
Location
Hochschule Regensburg
Published
27.07.2011
x

Please add some content in Animated Sidebar block region. For more information please refer to this tutorial page:

Add content in animated sidebar