free tracker


Buffer Overflow Attacks

Pub Date : 2005-01-29 | Author : Jason Deckard | Publisher : Elsevier

ISBN 10 : 0080488420
ISBN 13 : 9780080488424

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, ma..


Writing Security Tools And Exploits

Pub Date : 2006 | Author : James C. Foster | Publisher : Syngress Press

ISBN 10 : 1597499978
ISBN 13 : 9781597499972

Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of..


Coding Interviews

Pub Date : 2012-12-12 | Author : Harry He | Publisher : Apress

ISBN 10 : 9781430247616
ISBN 13 : 1430247614

This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming..


Reversing

Pub Date : 2011-12-12 | Author : Eldad Eilam | Publisher : John Wiley & Sons

ISBN 10 : 9781118079768
ISBN 13 : 1118079760

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse ..


Java Coding Guidelines

Pub Date : 2013-08-23 | Author : Fred Long | Publisher : Addison-Wesley

ISBN 10 : 9780133439540
ISBN 13 : 0133439542

“A must-read for all Java developers. . . . Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic..