free tracker
Categories Unlimited Books

Penetration Testing with Shellcode: Detect, exploit, and secure network-lev…


Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
  • A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security has always been a major concern for your application, your system, or your…


Penetration Testing

Pub Date : 2014-06-14 | Author : Georgia Weidman | Publisher : No Starch Press

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..


Mod Perl Developer S Cookbook

Pub Date : 2002-01-01 | Author : Geoffrey Young | Publisher : Sams Publishing

ISBN 10 : 0672322404
ISBN 13 : 9780672322402

A task-based reference that will provide experienced developers with useful recipes and easy-to-follow solutions to common problems when using mod_perl in Web applications. The fir..


Java Programming For Android Developers For Dummies

Pub Date : 2016-10-19 | Author : Barry A. Burd | Publisher : John Wiley & Sons

ISBN 10 : 9781119301127
ISBN 13 : 1119301122

Develop the next killer Android App using Java programming! Android is everywhere! It runs more than half the smartphones in the U.S.—and Java makes it go. If you want to cash in..


Network Programming With Perl

Pub Date : 2001 | Author : Lincoln D. Stein | Publisher : Addison-Wesley Professional

ISBN 10 : 0201615711
ISBN 13 : 9780201615715

A text focusing on the methods and alternatives for designed TCP/IP-based client/server systems and advanced techniques for specialized applications with Perl. A guide examining a ..


Secrets To Becoming A Genius Hacker

Pub Date : 2015-08-30 | Author : Steven E. Dunlop | Publisher :

ISBN 10 : 151725955X
ISBN 13 : 9781517259556

Your Expert Guide To Computer Hacking! NEW EDITION We Have Moved On From The Die Hard Bruce Willis Days of Computer Hacking... With Hacking: Secrets To Becoming A Genius Hacker - H..


Introduction To Evidence Based Practice

Pub Date : 2012-02-10 | Author : Lisa Hopp | Publisher : F.A. Davis

ISBN 10 : 9780803632868
ISBN 13 : 080363286X

Employers expect new graduates to be well-versed in evidence-based practice—its theory and its implementation. Begin with a concise introduction to evidence-based practice to gai..


Microsoft Encyclopedia Of Networking

Pub Date : 2002 | Author : Mitch Tulloch | Publisher :

ISBN 10 : 0735613788
ISBN 13 : 9780735613782

Tulloch provides A-Z detail about Microsoft networking technologies with the accuracy and expertise of those who know these products best-Microsoft itself. Along with critical cove..


Leave a Reply

Your email address will not be published. Required fields are marked *