free tracker
Categories Unlimited Books

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

Since 2004, built-in security measures on compilers and operating systems have become commonplace. The black hats have kept up with security enhancements. Have you?New
Mint Condition
Dispatch same day for order received before 12 noon
Guaranteed packaging
No quibbles returns


Pub Date : 2011 | Author : Jim O'Gorman | Publisher : No Starch Press

ISBN 10 : 9781593272883
ISBN 13 : 159327288X

"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywher..

Sip Demystified

Pub Date : 2001-09-18 | Author : Gonzalo Camarillo | Publisher : McGraw Hill Professional

ISBN 10 : 0071414622
ISBN 13 : 9780071414623

State-of-the-art SIP primer SIP (Session Initiation Protocol) is the open standard that will make IP telephony an irresistible force in communications, doing for converged services..

Network Security Hacks

Pub Date : 2006-10-30 | Author : Andrew Lockhart | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 0596551436
ISBN 13 : 9780596551438

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools..

Electronics A First Course

Pub Date : 2007-06-07 | Author : Owen Bishop | Publisher : Routledge

ISBN 10 : 9781136407109
ISBN 13 : 1136407103

Owen Bishop’s First Course starts with the basics of electricity and component types, and introduces students to practical work almost straightaway. No prior knowledge of electro..

Hunting Security Bugs

Pub Date : 2006 | Author : Tom Gallagher | Publisher :

ISBN 10 : 073562187X
ISBN 13 : 9780735621879

Provides information on ways to find security bugs in software before it is released...

Leave a Reply

Your email address will not be published. Required fields are marked *