free tracker


Sockets Shellcode Porting Coding

Pub Date : 2005 | Author : James C. Foster | Publisher :

ISBN 10 : 1597490334
ISBN 13 : 9781597490337

Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tool..


Buffer Overflow Attacks

Pub Date : 2005-01-29 | Author : Jason Deckard | Publisher : Elsevier

ISBN 10 : 0080488420
ISBN 13 : 9780080488424

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, ma..


Reversing

Pub Date : 2011-12-12 | Author : Eldad Eilam | Publisher : John Wiley & Sons

ISBN 10 : 9781118079768
ISBN 13 : 1118079760

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse ..


Black Hat Python

Pub Date : 2014-12-14 | Author : Justin Seitz | Publisher : No Starch Press

ISBN 10 : 9781593275907
ISBN 13 : 1593275900

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffe..


The Antivirus Hacker S Handbook

Pub Date : 2015-09-28 | Author : Joxean Koret | Publisher : John Wiley & Sons

ISBN 10 : 9781119028758
ISBN 13 : 1119028752

"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network..