free tracker
Categories Unlimited Books

Writing Security Tools and Exploits



Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code…


Writing Security Tools And Exploits

Pub Date : 2006 | Author : James C. Foster | Publisher : Syngress Press

ISBN 10 : 1597499978
ISBN 13 : 9781597499972

Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of..



Buffer Overflow Attacks

Pub Date : 2005-01-29 | Author : Jason Deckard | Publisher : Elsevier

ISBN 10 : 0080488420
ISBN 13 : 9780080488424

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, ma..


Hacking The Code

Pub Date : 2004-05-10 | Author : Mark Burnett | Publisher : Elsevier

ISBN 10 : 0080478174
ISBN 13 : 9780080478173

Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hun..



Hacking 2nd Edition

Pub Date : 2008 | Author : Jon Erickson | Publisher : No Starch Press

ISBN 10 : 9781593271442
ISBN 13 : 1593271441

An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic atta..


Hacking Exposed Wireless

Pub Date : 2007-04-10 | Author : Johnny Cache | Publisher : McGraw Hill Professional

ISBN 10 : 9780071509695
ISBN 13 : 0071509690

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this..


Leave a Reply

Your email address will not be published. Required fields are marked *