<ul><li>This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application<li>New material addresses the many new exploitation techniques that have been discovered si
The Shellcoder's Handbook: Discovering and Exploiting Security
✍ Scribed by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
- Publisher
- Wiley
- Year
- 2004
- Tongue
- English
- Leaves
- 644
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Stop hackers from wreaking havoc on your software applications and operating systems. This innovative book provides tools to discover vulnerabilities in C-language-based software, exploit what you find, and prevent new security holes from occurring.
✦ Subjects
Информатика и вычислительная техника;Информационная безопасность;Кибербезопасность и киберпреступления;
📜 SIMILAR VOLUMES
UlliThis much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationliNew material addresses the many new exploitation techniques that have been discovered since th
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the fi
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the firs
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the firs
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the firs