Related Books
Language: en
Pages: 758
Pages: 758
Type: BOOK - Published: 2011-02-16 - Publisher: John Wiley & Sons
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security hole
Language: en
Pages: 214
Pages: 214
Type: BOOK - Published: 2018-03-06 - Publisher: oshean collins
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you c
Language: en
Pages: 697
Pages: 697
Type: BOOK - Published: 2005-04-26 - Publisher: Elsevier
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The
Language: en
Pages: 354
Pages: 354
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Language: en
Pages: 536
Pages: 536
Type: BOOK - Published: 2005-07-14 - Publisher: John Wiley & Sons
This handbook covers how to break into and how to defend the most popular database server software.