Related Books
Language: en
Pages: 758
Pages: 758
Type: BOOK - Published: 2011-02-16 - Publisher: John Wiley & Sons
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security hole
Language: en
Pages: 630
Pages: 630
Type: BOOK - Published: 2011-12-12 - Publisher: John Wiley & Sons
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various appl
Language: en
Pages: 354
Pages: 354
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Language: en
Pages: 770
Pages: 770
Type: BOOK - Published: 2011-03-16 - Publisher: John Wiley & Sons
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-w
Language: en
Pages: 512
Pages: 512
Type: BOOK - Published: 2004-09 - Publisher: Pearson Education India